Analysis

  • max time kernel
    77s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 06:56

General

  • Target

    b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe

  • Size

    31KB

  • MD5

    6e0a4f1f9140d7887a8ed96da1a1e020

  • SHA1

    79639bbc3be26ce8fb9c2b374c0f8e9c7c5ede84

  • SHA256

    b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54

  • SHA512

    0b7eb67a673e8b1063805b13367f4e12bff5f8c427d37230070e81f9c054be8d8411550b385f2602c0d57df905e62a378e13ea9e91341cac4e6ab75035bb6ce1

  • SSDEEP

    768:HFIt7RCKxsoJXNlpy22jVz41IKWvRE7evt7fq:H2hR5KGpy28V45WJdt

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe
    "C:\Users\Admin\AppData\Local\Temp\b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:996
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\2359299.bat
        2⤵
        • Deletes itself
        PID:1564

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2359299.bat

      Filesize

      299B

      MD5

      1e854322bcd61247bcc7cdcc941ff5c2

      SHA1

      46d9ee7e4aebe282139438def87c777b4fac6924

      SHA256

      fffc4d3b7f03b1e3a9547d11d67a04dd678d4a02a72dd39182fc6375d95c42e8

      SHA512

      40441506d6dc5f5cd3ce8a2894b055ad4c413d7f9a22b17e3d376efc37bc16b46916e3e60b68f00ee07569b5d8fed19fa253adc63b73063ad4f8dd2869cb0b84

    • memory/996-55-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/996-57-0x00000000000D2104-mapping.dmp

    • memory/996-58-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1052-54-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1052-60-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/1564-59-0x0000000000000000-mapping.dmp