Analysis
-
max time kernel
45s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 05:29
Static task
static1
Behavioral task
behavioral1
Sample
3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe
-
Size
324KB
-
MD5
3c2200577d658460f4c66ddfd28685ef
-
SHA1
f807aeb04fb44b52b0a2c5a5eb12485d3f410777
-
SHA256
3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376
-
SHA512
1f73bcf3025698cf28fcc634673a7adf4ade128f37fec26f036258e779781b5b2e77403a870c104a080240ffed616cb6416d2f5c4c391de42cd38f58dcd3c9a8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1792-55-0x00000000003D0000-0x00000000003FB000-memory.dmp upx behavioral1/memory/1792-56-0x00000000003D0000-0x00000000003FB000-memory.dmp upx behavioral1/memory/1792-67-0x00000000003D0000-0x00000000003FB000-memory.dmp upx behavioral1/memory/2036-72-0x00000000003D0000-0x00000000003FB000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exedescription pid process target process PID 1792 set thread context of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exedescription pid process target process PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe PID 1792 wrote to memory of 2036 1792 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe 3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe"C:\Users\Admin\AppData\Local\Temp\3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe"C:\Users\Admin\AppData\Local\Temp\3cbcd861a82da68fa0392c4ca825061feb759986cdbf633508309ae84fcee376.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1792-54-0x0000000075C51000-0x0000000075C53000-memory.dmpFilesize
8KB
-
memory/1792-55-0x00000000003D0000-0x00000000003FB000-memory.dmpFilesize
172KB
-
memory/1792-56-0x00000000003D0000-0x00000000003FB000-memory.dmpFilesize
172KB
-
memory/1792-67-0x00000000003D0000-0x00000000003FB000-memory.dmpFilesize
172KB
-
memory/2036-63-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2036-60-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2036-62-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2036-61-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2036-58-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2036-66-0x00000000004010E7-mapping.dmp
-
memory/2036-65-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2036-57-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2036-70-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2036-72-0x00000000003D0000-0x00000000003FB000-memory.dmpFilesize
172KB
-
memory/2036-71-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/2036-73-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB