Analysis
-
max time kernel
101s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe
Resource
win10v2004-20220812-en
General
-
Target
53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe
-
Size
501KB
-
MD5
12d33d798f7f39b1907557f949507c39
-
SHA1
9d73618f82d9b4167db80a8c5b1be4078dafc55c
-
SHA256
53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b
-
SHA512
f35c2a6274eac02bce330269cb7f65669d454cf31c92980a13ba078b31be2e805c31ae90cffb30803cc42fcaa92ff6b94f1f4ee41f4e33dbb011319656e4571e
-
SSDEEP
12288:LG+i6WfnT2290aFYR8P0oFkuwbZ+7OTIiP:LG597X1Fk3bZ+7OTII
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4996 set thread context of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83 PID 4996 wrote to memory of 324 4996 53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe"C:\Users\Admin\AppData\Local\Temp\53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe"C:\Users\Admin\AppData\Local\Temp\53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe"2⤵PID:324
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\53a5dff6cff1b47755f336bc681e67dafe1c2f061efd0d166b211c144f8fe04b.exe.log
Filesize400B
MD50a9b4592cd49c3c21f6767c2dabda92f
SHA1f534297527ae5ccc0ecb2221ddeb8e58daeb8b74
SHA256c7effe9cb81a70d738dee863991afefab040290d4c4b78b4202383bcb9f88fcd
SHA5126b878df474e5bbfb8e9e265f15a76560c2ef151dcebc6388c82d7f6f86ffaf83f5ade5a09f1842e493cb6c8fd63b0b88d088c728fd725f7139f965a5ee332307