Analysis

  • max time kernel
    39s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 22:01

General

  • Target

    f4067cc6287a321ade77c5f55097de4578f1ba829098def1c6515de6d60780c1.exe

  • Size

    249KB

  • MD5

    64f2f1fb68e71335e46cc3f5468f977f

  • SHA1

    3d6c12a4ab79328e800e7b6c9e2ef9dafde35313

  • SHA256

    f4067cc6287a321ade77c5f55097de4578f1ba829098def1c6515de6d60780c1

  • SHA512

    76dc353251109febe24f483764f6d83e4c1dfad681752993b9deafb881bfb4587c450ec6bfc8d595da1480a17cf558c397adf756dafaf0d3c9350af7e51b99b6

  • SSDEEP

    6144:D/CaA1/1QI0xotv5pNNC17tnKmJrAMFhJgVj5V9kW4h1:D/Calqv5pmptKmJrAogVj1q

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4067cc6287a321ade77c5f55097de4578f1ba829098def1c6515de6d60780c1.exe
    "C:\Users\Admin\AppData\Local\Temp\f4067cc6287a321ade77c5f55097de4578f1ba829098def1c6515de6d60780c1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Users\Admin\AppData\Local\Temp\f4067cc6287a321ade77c5f55097de4578f1ba829098def1c6515de6d60780c1.exe
      "C:\Users\Admin\AppData\Local\Temp\f4067cc6287a321ade77c5f55097de4578f1ba829098def1c6515de6d60780c1.exe"
      2⤵
        PID:1852

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1852-54-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/1852-55-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/1852-57-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/1852-58-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/1852-60-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/1852-63-0x0000000076151000-0x0000000076153000-memory.dmp

            Filesize

            8KB

          • memory/1852-64-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/1852-65-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB