Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 21:59

General

  • Target

    cf84b747378e392705b8f75d12d68d4383861a7ea19dba6c17a168961c8454ac.exe

  • Size

    27KB

  • MD5

    0b3f69648e70c76faa3e24d718e41520

  • SHA1

    a0d8a03ac02cf1f8b048349e6da2a96a03b97909

  • SHA256

    cf84b747378e392705b8f75d12d68d4383861a7ea19dba6c17a168961c8454ac

  • SHA512

    e7ff592030e288cadca3be9f347e625921293acb9fcd5b8f9693628f4c44e04b1c2747d129cb6b7c37f1011048551650c125bd27574f3a1ce305281a3f47579e

  • SSDEEP

    384:WQMHVCr6N1XgCKqwl6PTXPYsyxfWQIXHlWL45gtlJki/QybPp1qHZ:WDHVaO1X79yxf18Ik4lJd/QI34

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf84b747378e392705b8f75d12d68d4383861a7ea19dba6c17a168961c8454ac.exe
    "C:\Users\Admin\AppData\Local\Temp\cf84b747378e392705b8f75d12d68d4383861a7ea19dba6c17a168961c8454ac.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:2032

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1948-54-0x0000000076031000-0x0000000076033000-memory.dmp

            Filesize

            8KB

          • memory/1948-59-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2032-57-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/2032-55-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB