Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 08:14

General

  • Target

    b7d0ccfa2822a9f89fc1b696a77042d01083faeb4d7a439faa64cdabdbc30c7e.exe

  • Size

    302KB

  • MD5

    43f0d3d773d30ccd5d840338c5d7dad0

  • SHA1

    f945cab682b84bd19acaacfa3a69ff102c6aa1e2

  • SHA256

    b7d0ccfa2822a9f89fc1b696a77042d01083faeb4d7a439faa64cdabdbc30c7e

  • SHA512

    032e50dddc0adf82e67ce5a0538a0d182d01090b229e2bc925e2ddd5c25b475468f794e4ef7b7a594e531c5a3c2a8f4e1eefe8a04e0ee4412e1275b6c2f21486

  • SSDEEP

    6144:l9bR+dQkX/YM+ayc67NYSf5/YvW3s+1Z0+3L9K6L4cQC:R+dBAM+lNfT3Kb6L4cQC

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7d0ccfa2822a9f89fc1b696a77042d01083faeb4d7a439faa64cdabdbc30c7e.exe
    "C:\Users\Admin\AppData\Local\Temp\b7d0ccfa2822a9f89fc1b696a77042d01083faeb4d7a439faa64cdabdbc30c7e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\b7d0ccfa2822a9f89fc1b696a77042d01083faeb4d7a439faa64cdabdbc30c7e.exe
      C:\Users\Admin\AppData\Local\Temp\b7d0ccfa2822a9f89fc1b696a77042d01083faeb4d7a439faa64cdabdbc30c7e.exe
      2⤵
        PID:1252

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1252-55-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/1252-56-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/1252-58-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/1252-59-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/1252-61-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/1252-66-0x0000000000400000-0x0000000000437000-memory.dmp

            Filesize

            220KB

          • memory/1768-54-0x0000000075931000-0x0000000075933000-memory.dmp

            Filesize

            8KB

          • memory/1768-63-0x0000000001D00000-0x0000000001D04000-memory.dmp

            Filesize

            16KB