Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    29-06-2020 07:30

General

  • Target

    ea8b31057b96e014214275c5de49dd66c22ac523098100b6ec624384a2f9b35d.exe

  • Size

    254KB

  • MD5

    def723df50f19b499ec3dada4f8f0eec

  • SHA1

    f2ee1e0bc1a6bb844068bf38219249fdc9149670

  • SHA256

    ea8b31057b96e014214275c5de49dd66c22ac523098100b6ec624384a2f9b35d

  • SHA512

    38f988602054e32d1675bae1d124dc2074a25a2c932d2d5d65108f56dfa9099719def36f8ef11792c43dff2bbc6e00563669c6b677ca3e3c1260034dc90f7ca4

Score
5/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 16 IoCs
  • Suspicious use of SetThreadContext 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea8b31057b96e014214275c5de49dd66c22ac523098100b6ec624384a2f9b35d.exe
    "C:\Users\Admin\AppData\Local\Temp\ea8b31057b96e014214275c5de49dd66c22ac523098100b6ec624384a2f9b35d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\ea8b31057b96e014214275c5de49dd66c22ac523098100b6ec624384a2f9b35d.exe
      "{path}"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe"
        3⤵
          PID:2792

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2480-0-0x0000000000400000-0x0000000000553000-memory.dmp
      Filesize

      1.3MB

    • memory/2480-1-0x0000000000405907-mapping.dmp
    • memory/2480-2-0x0000000000400000-0x0000000000553000-memory.dmp
      Filesize

      1.3MB

    • memory/2792-3-0x0000000000000000-mapping.dmp
    • memory/2792-4-0x0000000000000000-mapping.dmp