Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 14:54

General

  • Target

    3340d72e8148f3d97095b5ab410a52f2495ad28470d8bbc110d3f49023daa693.exe

  • Size

    226KB

  • MD5

    57208ac3c5e6cce9b996a470af186f10

  • SHA1

    7ad7d57ab1998fd8c20b92c395ba3d15fb16164d

  • SHA256

    3340d72e8148f3d97095b5ab410a52f2495ad28470d8bbc110d3f49023daa693

  • SHA512

    9c3f556f2f5266a37d00157b876a81728c8cffe64a5b5942fbdbdd83b6a8f6431fa8a901dd2ab7eae273da1a88714d74957f783d9361d087717988b034567740

  • SSDEEP

    6144:dB9eRRUHESQVGcqTs4SYEcQnzpknvr4E6:dXeRRUrvTAlc6vE6

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3340d72e8148f3d97095b5ab410a52f2495ad28470d8bbc110d3f49023daa693.exe
    "C:\Users\Admin\AppData\Local\Temp\3340d72e8148f3d97095b5ab410a52f2495ad28470d8bbc110d3f49023daa693.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\3340d72e8148f3d97095b5ab410a52f2495ad28470d8bbc110d3f49023daa693.exe
      C:\Users\Admin\AppData\Local\Temp\3340d72e8148f3d97095b5ab410a52f2495ad28470d8bbc110d3f49023daa693.exe
      2⤵
        PID:704

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/704-134-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/704-138-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/2144-132-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/2144-136-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/2144-137-0x0000000000610000-0x0000000000614000-memory.dmp

            Filesize

            16KB