Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-06-2022 20:08
Static task
static1
Behavioral task
behavioral1
Sample
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe
Resource
win10v2004-20220414-en
General
-
Target
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe
-
Size
1.4MB
-
MD5
0cff6c361737377f9eefb9d42a8040ef
-
SHA1
d9062f7e2d60be35b942793ebc12833b4b5e35c5
-
SHA256
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253
-
SHA512
e8e584d4a3d36336436714bd392e2e3228526467fd77d22f2219ba3169fcfb06d1d526f8a57d37153d53f564e5fbd2a2aefbe2ef7ba1c4242162bff5930162c4
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exedescription pid Process procid_target PID 2684 set thread context of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exepid Process 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 3316 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 3316 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exepid Process 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exedescription pid Process procid_target PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 2684 wrote to memory of 3316 2684 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 81 PID 3316 wrote to memory of 4704 3316 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 83 PID 3316 wrote to memory of 4704 3316 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 83 PID 3316 wrote to memory of 4704 3316 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe"C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exeC:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\558GJD~1.BAT"3⤵PID:4704
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD58094cf68a43aa14d10602f6a152ad0b4
SHA1554b5f71d35e357f5142d55a95fcd53a4faa6ad1
SHA256ed0535af2d1480402f60b7a47ed25f46553ecab5036806e45161bfa35f7c3578
SHA512762d9ae2335db978f65149980fa6388ae30386646b22c0e8f50effb6b802b48e321b487b05fbe36422185728f01025c6db17139d227331f29592ca2feeafab17