Analysis

  • max time kernel
    52s
  • max time network
    182s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-09-2022 04:47

General

  • Target

    7f72bb2eb4ea1f0914a9cb1de72d424efe2e183a7a78ef974a655914a9ce9790.exe

  • Size

    6.5MB

  • MD5

    a037f22807116f6b8353480b4898f642

  • SHA1

    81c121d4b201faadc62ea29e1caa0e855abc6dc1

  • SHA256

    7f72bb2eb4ea1f0914a9cb1de72d424efe2e183a7a78ef974a655914a9ce9790

  • SHA512

    1b2e811b521fe0808da99ef556aed386d47c1556b6d7656c630e3080585465da16f445a3a28058986483da785544d849cdc7b6a39fe834143155a20ae7b436bb

  • SSDEEP

    196608:O3oKkJpbmOREqZa30Kq++67O1bVrPphR5:Wo3QOREJqjvBPvH

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f72bb2eb4ea1f0914a9cb1de72d424efe2e183a7a78ef974a655914a9ce9790.exe
    "C:\Users\Admin\AppData\Local\Temp\7f72bb2eb4ea1f0914a9cb1de72d424efe2e183a7a78ef974a655914a9ce9790.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 268
      2⤵
      • Program crash
      PID:4800

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3764-120-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-121-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-122-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-123-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-124-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-125-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-126-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-127-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-128-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-129-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-130-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-131-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-132-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-133-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-134-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-135-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-136-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-137-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-138-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-139-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-140-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-141-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-143-0x0000000000400000-0x0000000001278000-memory.dmp

    Filesize

    14.5MB

  • memory/3764-142-0x0000000000400000-0x0000000001278000-memory.dmp

    Filesize

    14.5MB

  • memory/3764-145-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3764-146-0x000000000161A000-0x0000000001640000-memory.dmp

    Filesize

    152KB

  • memory/3764-147-0x0000000002FF0000-0x0000000003020000-memory.dmp

    Filesize

    192KB

  • memory/3764-148-0x0000000000400000-0x0000000001278000-memory.dmp

    Filesize

    14.5MB