Analysis

  • max time kernel
    121s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    27-01-2022 12:01

General

  • Target

    358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe

  • Size

    394KB

  • MD5

    7fcbff331b40e7edcd4985a65a9ab621

  • SHA1

    9f420992112f832fbada4b258aa9132f2f4e798d

  • SHA256

    358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca

  • SHA512

    1fd41c11bd30962be2421a08175797d9da83c98dc7f0424fdfea92bb3fd8ddd316e40a57944d56e72aeeb19809720fadd1c89c2affb3c87ba89ef754b24a2576

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe
    "C:\Users\Admin\AppData\Local\Temp\358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Users\Admin\AppData\Local\Temp\358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe
      "C:\Users\Admin\AppData\Local\Temp\358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe"
      2⤵
        PID:1496

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/624-115-0x0000000002580000-0x00000000025AF000-memory.dmp

      Filesize

      188KB

    • memory/1496-116-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1496-117-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB