Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 02:07

General

  • Target

    dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1.exe

  • Size

    206KB

  • MD5

    024f08de698b6b7e784214f4fcaa05a4

  • SHA1

    e2ba2fc3ef2b8b97a7ed500633cda58fdd652a93

  • SHA256

    dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1

  • SHA512

    b94e940653076d29c780c2ecb4f4910737404f9f8861b14b254f06069616962f12c7976bcc8bc30f7a04596432988c6db2ac949011e7d92414e2e7672b2c3084

  • SSDEEP

    3072:7YbzUjda2IUFtqEqWDPuA3JXYIBLgU+XCOjBS/9sCQqp6FV2M/MJ4Lo8HecmbCwO:8bQ5Z1tbDPbaQLyl0uPqp6iM/8Oy131

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1.exe
    "C:\Users\Admin\AppData\Local\Temp\dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3364
    • C:\Users\Admin\AppData\Local\Temp\dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1.exe
      "C:\Users\Admin\AppData\Local\Temp\dfea0b49c1cfa9fbd0aa168fe740a70d6eab0c40e544e9b105ce8fb3eed795e1.exe"
      2⤵
      • Enumerates system info in registry
      PID:4908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3364-132-0x00000000006F4000-0x0000000000719000-memory.dmp

    Filesize

    148KB

  • memory/3364-133-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3364-134-0x00000000006F4000-0x0000000000719000-memory.dmp

    Filesize

    148KB

  • memory/3364-139-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3364-140-0x00000000006F4000-0x0000000000719000-memory.dmp

    Filesize

    148KB

  • memory/4908-135-0x0000000000000000-mapping.dmp

  • memory/4908-136-0x0000000000693000-0x00000000006B8000-memory.dmp

    Filesize

    148KB

  • memory/4908-137-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4908-138-0x0000000000693000-0x00000000006B8000-memory.dmp

    Filesize

    148KB

  • memory/4908-141-0x0000000000693000-0x00000000006B8000-memory.dmp

    Filesize

    148KB