Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2022, 05:42

General

  • Target

    419634a5263c224938acf66329dd20924dd56706af366e86fe3bdef4cc417286.exe

  • Size

    1.2MB

  • MD5

    d703ec447cb50ed0f42cc19366083c89

  • SHA1

    ea5e7c396973db2c22e0bd2780a70ec756aed61f

  • SHA256

    419634a5263c224938acf66329dd20924dd56706af366e86fe3bdef4cc417286

  • SHA512

    950b0eadebc1b4155482ba6ea4c9cca478fb9c6291158180b86a7a6286d18b06560fb9139aaa73ec764d0f02acda231599f10f692ec9f5613d0d84230b8643cb

  • SSDEEP

    24576:ptdIcFy9oK0YqYpWZwzQ7gMFGdBD2zT/sXD9D1M7:ptdIWwoyVOfsV1M

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\419634a5263c224938acf66329dd20924dd56706af366e86fe3bdef4cc417286.exe
    "C:\Users\Admin\AppData\Local\Temp\419634a5263c224938acf66329dd20924dd56706af366e86fe3bdef4cc417286.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:100084

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/100084-54-0x00000000000D0000-0x00000000000E6000-memory.dmp

            Filesize

            88KB

          • memory/100084-56-0x00000000000D0000-0x00000000000E6000-memory.dmp

            Filesize

            88KB