Analysis

  • max time kernel
    96s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 02:40

General

  • Target

    226bedf06459b1f411b03091021e02ac0d42cf5b362e0dab4f08283f65466964.exe

  • Size

    101KB

  • MD5

    b5ecff4776c57616568fdbdf0798d9a4

  • SHA1

    86b6a24745fddd4ddd38c5f6a714110f21e9eda6

  • SHA256

    226bedf06459b1f411b03091021e02ac0d42cf5b362e0dab4f08283f65466964

  • SHA512

    b9c83c7bdf12f966ac8dbb60967504efb0a50f32693c6f5b2f8eb9d291f19031d2624b51f4eb64dbd082e70916ea823920a666375f8d7e489900667d30eb8b2c

  • SSDEEP

    1536:SIS/9aalDBxLWoryTgqSJodXEYrvczskIKal9qfNrsKIbuIJAxtMal+:SPDbaoSsKE2kdKl9qNxIb01+

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3044
      • C:\Users\Admin\AppData\Local\Temp\226bedf06459b1f411b03091021e02ac0d42cf5b362e0dab4f08283f65466964.exe
        "C:\Users\Admin\AppData\Local\Temp\226bedf06459b1f411b03091021e02ac0d42cf5b362e0dab4f08283f65466964.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3256
        • C:\Users\Admin\AppData\Local\Temp\226bedf06459b1f411b03091021e02ac0d42cf5b362e0dab4f08283f65466964.exe
          C:\Users\Admin\AppData\Local\Temp\226bedf06459b1f411b03091021e02ac0d42cf5b362e0dab4f08283f65466964.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3836

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3044-141-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3836-134-0x0000000000000000-mapping.dmp

    • memory/3836-135-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3836-136-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3836-139-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3836-140-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/3836-142-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3836-143-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB