Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 02:35

General

  • Target

    d275f75fd816a5635795897e9af20bec1753fc6a98e3b30b9d4efbdf24a053c3.exe

  • Size

    104KB

  • MD5

    6c4625c274486a2af1a568e15076eb28

  • SHA1

    b5700d0bb57d4f2f39b99092ff3de4baac3335ae

  • SHA256

    d275f75fd816a5635795897e9af20bec1753fc6a98e3b30b9d4efbdf24a053c3

  • SHA512

    d24f15710378ff1dbf0065722ef12b373c8059d744eaea06d4f81d5c2e98232404ea664424b041b7f1487f0af3948d03492897fde3f219bd01bf9c7e6a2f8e64

  • SSDEEP

    1536:ZP7LRKwFKi/fLR2dpCLg8UTIksNThP46/nSM7gQZPYD6qt9:JodMl2dpGSFormQqD6u9

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d275f75fd816a5635795897e9af20bec1753fc6a98e3b30b9d4efbdf24a053c3.exe
    "C:\Users\Admin\AppData\Local\Temp\d275f75fd816a5635795897e9af20bec1753fc6a98e3b30b9d4efbdf24a053c3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Users\Admin\AppData\Local\Temp\d275f75fd816a5635795897e9af20bec1753fc6a98e3b30b9d4efbdf24a053c3.exe
      C:\Users\Admin\AppData\Local\Temp\d275f75fd816a5635795897e9af20bec1753fc6a98e3b30b9d4efbdf24a053c3.exe
      2⤵
        PID:4668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 236
          3⤵
          • Program crash
          PID:1696
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4668 -ip 4668
      1⤵
        PID:4988

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4668-138-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4668-140-0x000000000042A000-0x0000000000433000-memory.dmp

        Filesize

        36KB

      • memory/4668-139-0x000000000042A000-0x0000000000433000-memory.dmp

        Filesize

        36KB

      • memory/4668-141-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4668-142-0x0000000000400000-0x0000000000432542-memory.dmp

        Filesize

        201KB

      • memory/4668-143-0x0000000000020000-0x0000000000023000-memory.dmp

        Filesize

        12KB