Analysis

  • max time kernel
    151s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 16:00

General

  • Target

    1db137ef0019abfd54c665f6b9b622413dcab4b8c358a97de0cf6fc2da105cb3.exe

  • Size

    181KB

  • MD5

    6e2b3e6b349cb358bfe033de2f62b4a9

  • SHA1

    7b5faab72070d892f3d3b6c0e17b9a91065d0da8

  • SHA256

    1db137ef0019abfd54c665f6b9b622413dcab4b8c358a97de0cf6fc2da105cb3

  • SHA512

    10269cc4125d68d56d50880cff606bea4d9024c8c616393780038932030b10d789be4ecf8062934072013a2537e941880231a55454fea3fd491f6a94e1d9f133

  • SSDEEP

    3072:VadybPD0xVG+Uwlf/iy0GqCKCExX7t/0UwKT5XiTsIigSMi9BTZsuQfBdRnM:Md6PDUGoZ3kxrt/bAJifMi9BTOuU

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1db137ef0019abfd54c665f6b9b622413dcab4b8c358a97de0cf6fc2da105cb3.exe
    "C:\Users\Admin\AppData\Local\Temp\1db137ef0019abfd54c665f6b9b622413dcab4b8c358a97de0cf6fc2da105cb3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Users\Admin\AppData\Local\Temp\1db137ef0019abfd54c665f6b9b622413dcab4b8c358a97de0cf6fc2da105cb3.exe
      "C:\Users\Admin\AppData\Local\Temp\1db137ef0019abfd54c665f6b9b622413dcab4b8c358a97de0cf6fc2da105cb3.exe"
      2⤵
      • Enumerates system info in registry
      PID:2140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2140-134-0x00000000007D8000-0x00000000007EB000-memory.dmp

    Filesize

    76KB

  • memory/2140-137-0x00000000007D8000-0x00000000007EB000-memory.dmp

    Filesize

    76KB

  • memory/2140-135-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3904-132-0x00000000004EB000-0x00000000004FE000-memory.dmp

    Filesize

    76KB

  • memory/3904-136-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3904-138-0x00000000004EB000-0x00000000004FE000-memory.dmp

    Filesize

    76KB