Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 07:42

General

  • Target

    5a9c1f19310c739d511cf341528bd399ee51ce7754a867fe11c8ef7975950612.exe

  • Size

    187KB

  • MD5

    64d955180df9266f94dde89a58a2c2d0

  • SHA1

    0bdd664dec7676b74326d3789df5abe9c2ff061f

  • SHA256

    5a9c1f19310c739d511cf341528bd399ee51ce7754a867fe11c8ef7975950612

  • SHA512

    17036d208b1e1f5d2125b4815f9dbf7b44cd0ee152dbf9bb6cc9ff978497768ce9a96270d3385841cd046ceb1610b20c415ba465e852ea2ca3212436ad3a5ca0

  • SSDEEP

    3072:Yj69VliIWW/4NXKceOdytUF7Ump07UugaddNmjgyCGq9nY060gS4OvlU:X9SIa9AtUFUmpomjgyCGWnYP0gOlU

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a9c1f19310c739d511cf341528bd399ee51ce7754a867fe11c8ef7975950612.exe
    "C:\Users\Admin\AppData\Local\Temp\5a9c1f19310c739d511cf341528bd399ee51ce7754a867fe11c8ef7975950612.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\5a9c1f19310c739d511cf341528bd399ee51ce7754a867fe11c8ef7975950612.exe
      assdfaasda
      2⤵
        PID:1228

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1204-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

      Filesize

      8KB

    • memory/1228-55-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/1228-57-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/1228-61-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB