Analysis

  • max time kernel
    116s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-06-2022 20:08

General

  • Target

    251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe

  • Size

    1.4MB

  • MD5

    0cff6c361737377f9eefb9d42a8040ef

  • SHA1

    d9062f7e2d60be35b942793ebc12833b4b5e35c5

  • SHA256

    251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253

  • SHA512

    e8e584d4a3d36336436714bd392e2e3228526467fd77d22f2219ba3169fcfb06d1d526f8a57d37153d53f564e5fbd2a2aefbe2ef7ba1c4242162bff5930162c4

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe
    "C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe
      C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3316
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\558GJD~1.BAT"
        3⤵
          PID:4704

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\558gjdAtywVbej.bat

      Filesize

      201B

      MD5

      8094cf68a43aa14d10602f6a152ad0b4

      SHA1

      554b5f71d35e357f5142d55a95fcd53a4faa6ad1

      SHA256

      ed0535af2d1480402f60b7a47ed25f46553ecab5036806e45161bfa35f7c3578

      SHA512

      762d9ae2335db978f65149980fa6388ae30386646b22c0e8f50effb6b802b48e321b487b05fbe36422185728f01025c6db17139d227331f29592ca2feeafab17

    • memory/2684-131-0x0000000000830000-0x0000000000834000-memory.dmp

      Filesize

      16KB

    • memory/3316-130-0x0000000000000000-mapping.dmp

    • memory/3316-132-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3316-133-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3316-134-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3316-135-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/3316-137-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/4704-136-0x0000000000000000-mapping.dmp