Analysis

  • max time kernel
    127s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 21:50

General

  • Target

    bcdd903ba458b3ec5f2cb218e5eec846f7125515cbacd7dac2070247a8d679c5.exe

  • Size

    173KB

  • MD5

    a0c55a1d0449994c4badb62d78b541a0

  • SHA1

    fb8312143656a08ff5c8f9ab5ba77d8988c9b943

  • SHA256

    bcdd903ba458b3ec5f2cb218e5eec846f7125515cbacd7dac2070247a8d679c5

  • SHA512

    260334498a32d7438093b213b6094669d62211656754cdbfe6d1893b1d2425bbe7194ab6240d0a45e7654e0c271df39078532728daaccde8246ced9504be627d

  • SSDEEP

    3072:IALnXvRgb3XDI4Jnzi4PkQMs7k327gDOJ+clttXxXTx:lLnwJzinQBk+sxiZTx

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcdd903ba458b3ec5f2cb218e5eec846f7125515cbacd7dac2070247a8d679c5.exe
    "C:\Users\Admin\AppData\Local\Temp\bcdd903ba458b3ec5f2cb218e5eec846f7125515cbacd7dac2070247a8d679c5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\bcdd903ba458b3ec5f2cb218e5eec846f7125515cbacd7dac2070247a8d679c5.exe
      C:\Users\Admin\AppData\Local\Temp\bcdd903ba458b3ec5f2cb218e5eec846f7125515cbacd7dac2070247a8d679c5.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Users\Admin\AppData\Local\Temp\bcdd903ba458b3ec5f2cb218e5eec846f7125515cbacd7dac2070247a8d679c5.exe
        C:\Users\Admin\AppData\Local\Temp\bcdd903ba458b3ec5f2cb218e5eec846f7125515cbacd7dac2070247a8d679c5.exe
        3⤵
          PID:4448
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 188
            4⤵
            • Program crash
            PID:4672
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4448 -ip 4448
      1⤵
        PID:2912

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/836-138-0x0000000000470000-0x0000000000474000-memory.dmp

        Filesize

        16KB

      • memory/1540-133-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/1540-134-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/1540-135-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/1540-139-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/4448-137-0x0000000000400000-0x000000000040E000-memory.dmp

        Filesize

        56KB