Analysis

  • max time kernel
    71s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2022 23:15

General

  • Target

    b42d8a6cb90a8248e582c04d5f35cf7e5bb7cd5db017306609669412f469d1be.exe

  • Size

    223KB

  • MD5

    6873c4653842e311f001cbe6992c4d4d

  • SHA1

    b218b19f9717a5c3ccc053de85ed61aaf33ef72a

  • SHA256

    b42d8a6cb90a8248e582c04d5f35cf7e5bb7cd5db017306609669412f469d1be

  • SHA512

    d61c65529641d30af8fc9ee543d016ca47412a91573dd17fe7cba78ed2e4db8681bad1cae93f93f8761d804d92cb72f2ef63ee6baa3d605fedf5ef1bdce00421

  • SSDEEP

    3072:xAEtMHUsuRscxScK4ujZTvRTQqLtLfEJ4eMEOkUoE+YXgZinCFGIhZtPe0:xjSHwycJaR8qJEJ4SO3oE+YXgZCCd/W

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b42d8a6cb90a8248e582c04d5f35cf7e5bb7cd5db017306609669412f469d1be.exe
    "C:\Users\Admin\AppData\Local\Temp\b42d8a6cb90a8248e582c04d5f35cf7e5bb7cd5db017306609669412f469d1be.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Users\Admin\AppData\Local\Temp\b42d8a6cb90a8248e582c04d5f35cf7e5bb7cd5db017306609669412f469d1be.exe
      "C:\Users\Admin\AppData\Local\Temp\b42d8a6cb90a8248e582c04d5f35cf7e5bb7cd5db017306609669412f469d1be.exe"
      2⤵
        PID:980

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/668-54-0x0000000075981000-0x0000000075983000-memory.dmp
      Filesize

      8KB

    • memory/668-55-0x0000000074340000-0x00000000748EB000-memory.dmp
      Filesize

      5.7MB

    • memory/668-67-0x0000000074340000-0x00000000748EB000-memory.dmp
      Filesize

      5.7MB

    • memory/980-57-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/980-59-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/980-61-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/980-63-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/980-64-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/980-65-0x00000000012F36BE-mapping.dmp
    • memory/980-56-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/980-68-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/980-66-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/980-70-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/980-71-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB