Analysis
-
max time kernel
141s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-06-2022 22:32
Static task
static1
Behavioral task
behavioral1
Sample
2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe
Resource
win10v2004-20220414-en
General
-
Target
2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe
-
Size
229KB
-
MD5
78d164f8cc8430d730e849876d4e51e3
-
SHA1
b15747047d192a178e3ab89baff8c7b48250b9fd
-
SHA256
2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14
-
SHA512
7cf19d3626237718de05884d96befd5da79afde2d3f7687b1c4a515771cd119220a56f02f7b9be4c2fac432b32f77fd2bc092ee7a9999a42b022643517d751da
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1580 set thread context of 3400 1580 2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe 81 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1580 wrote to memory of 3400 1580 2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe 81 PID 1580 wrote to memory of 3400 1580 2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe 81 PID 1580 wrote to memory of 3400 1580 2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe 81 PID 1580 wrote to memory of 3400 1580 2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe 81 PID 1580 wrote to memory of 3400 1580 2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe 81 PID 1580 wrote to memory of 3400 1580 2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe 81 PID 1580 wrote to memory of 3400 1580 2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe 81 PID 1580 wrote to memory of 3400 1580 2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe"C:\Users\Admin\AppData\Local\Temp\2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe"C:\Users\Admin\AppData\Local\Temp\2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe"2⤵PID:3400
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\2c84fa00fd49cb5162b18f20cf0aecbe2a93a38bd6111354fc9c32865ef94d14.exe.log
Filesize20B
MD5b3ac9d09e3a47d5fd00c37e075a70ecb
SHA1ad14e6d0e07b00bd10d77a06d68841b20675680b
SHA2567a23c6e7ccd8811ecdf038d3a89d5c7d68ed37324bae2d4954125d9128fa9432
SHA51209b609ee1061205aa45b3c954efc6c1a03c8fd6b3011ff88cf2c060e19b1d7fd51ee0cb9d02a39310125f3a66aa0146261bdee3d804f472034df711bc942e316