Analysis
-
max time kernel
52s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23-09-2022 06:51
Static task
static1
Behavioral task
behavioral1
Sample
ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe
Resource
win10-20220812-en
General
-
Target
ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe
-
Size
11.0MB
-
MD5
f1a05cf25ca36cabef3fb195af9355ed
-
SHA1
f7e36236cadf3365b0207f069b1f257562d43662
-
SHA256
ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068
-
SHA512
a18a3aed5fe482110172011f5e39148f8609776b3405d77d97722ac03a392d7474396d231b4bc9f9e5f036f6f4884ca5fb4ffc062c31feb3679af4b551c5e34b
-
SSDEEP
196608:RTDyr2aUMxFUjkThyv2aUMxFPyKPT5ye2aUkxFKNAze7fIH/dqmxyyw/y/M15mxh:H
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exedescription pid process target process PID 1744 set thread context of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exedescription pid process target process PID 1744 wrote to memory of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe PID 1744 wrote to memory of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe PID 1744 wrote to memory of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe PID 1744 wrote to memory of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe PID 1744 wrote to memory of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe PID 1744 wrote to memory of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe PID 1744 wrote to memory of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe PID 1744 wrote to memory of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe PID 1744 wrote to memory of 4284 1744 ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe"C:\Users\Admin\AppData\Local\Temp\ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe"C:\Users\Admin\AppData\Local\Temp\ad9c4f25bffba23e226192c05d174fbc56b588d6ab5d78506f842e6b5f8cc068.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1744-138-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-150-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-118-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-119-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-120-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-121-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-122-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-123-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-124-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-125-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-126-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-127-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-128-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-129-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-130-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-131-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-116-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-133-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-134-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-135-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-136-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-137-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-140-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-139-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-132-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-141-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-142-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-143-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-144-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-145-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-146-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-147-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-148-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-149-0x00000000010B0000-0x0000000001BB4000-memory.dmpFilesize
11.0MB
-
memory/1744-117-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-151-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-154-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/4284-153-0x00000000009D436C-mapping.dmp
-
memory/4284-155-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/4284-152-0x00000000009B0000-0x00000000009E6000-memory.dmpFilesize
216KB
-
memory/4284-159-0x00000000009B0000-0x00000000009E6000-memory.dmpFilesize
216KB
-
memory/4284-162-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/4284-163-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/4284-165-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/4284-166-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/4284-164-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB