Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
09-03-2022 16:43
Static task
static1
Behavioral task
behavioral1
Sample
6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe
Resource
win10v2004-en-20220113
General
-
Target
6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe
-
Size
1.0MB
-
MD5
5e8183e3395b2c6c6ac39d40d28f3f8a
-
SHA1
f51db7e5d9dd7de25ee9b094a25a2fa593e8040d
-
SHA256
6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f
-
SHA512
be4138a2672d98822ec75b6892cd84120b2aee166bd332d961db812e8acd0c60f53fb7626aa29192304fcf6d9c1de09197959cd477d95c34c7a761fe5142731a
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exedescription pid process target process PID 1476 set thread context of 4576 1476 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exepid process 1476 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe 1476 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exepid process 1476 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe 1476 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exedescription pid process target process PID 1476 wrote to memory of 4576 1476 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe PID 1476 wrote to memory of 4576 1476 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe PID 1476 wrote to memory of 4576 1476 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe 6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe"C:\Users\Admin\AppData\Local\Temp\6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe"C:\Users\Admin\AppData\Local\Temp\6fd799e64e98e19e4fb4f82c62b673e389e7c4682368f7a3d88a723e241da68f.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1476-130-0x00000000023A0000-0x00000000023A1000-memory.dmpFilesize
4KB
-
memory/1476-131-0x0000000000400000-0x000000000050F000-memory.dmpFilesize
1.1MB
-
memory/4576-133-0x0000000000A80000-0x0000000000AE0000-memory.dmpFilesize
384KB
-
memory/4576-132-0x0000000000A80000-0x0000000000AE0000-memory.dmpFilesize
384KB
-
memory/4576-134-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB