Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 15:06

General

  • Target

    94b9aee492500dee18d795dded391b2dca26ab27c74397ed4328705f5bc8f3ec.exe

  • Size

    104KB

  • MD5

    6d3a1943f6ee222ba619c51c8fc571c1

  • SHA1

    590408291cf80cdd39626ab0e362627adc09a966

  • SHA256

    94b9aee492500dee18d795dded391b2dca26ab27c74397ed4328705f5bc8f3ec

  • SHA512

    585d3bb09b2cfa020b150a5ae26ba56e9d9a959bc55d9ef9eab3a06c60db526202877fc6ff8dab474738ac8c853d0a025a528b07211ff41f727e1906f94174af

  • SSDEEP

    1536:6bxBdQ2HY3TS5/3MHdaM57f5PcMMBxUxW:b2HY3TS5/Etf5RxW

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94b9aee492500dee18d795dded391b2dca26ab27c74397ed4328705f5bc8f3ec.exe
    "C:\Users\Admin\AppData\Local\Temp\94b9aee492500dee18d795dded391b2dca26ab27c74397ed4328705f5bc8f3ec.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/0-56-0x0000000000400000-0x0000000000402200-memory.dmp

    Filesize

    8KB