Analysis

  • max time kernel
    5s
  • max time network
    58s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2022 23:59

General

  • Target

    e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe

  • Size

    134KB

  • MD5

    0c949933a2e9af9593314215e3d4b399

  • SHA1

    49d2ffb2113f7bf628b4feba26fdc95ce15e273d

  • SHA256

    e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802

  • SHA512

    35741e4ab98625634176aadb19b932c2c4a2235290765cad524c803dfaf5ee876978dadac5ffd540c3e4d7e6d1fc3adeae0663a8614a751e03c7e79971c0dceb

  • SSDEEP

    3072:Xyh7+Xeo46jZz076KWQyWCGLm8+ndws6:XGC9jN076KgWCG6LE

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe
    "C:\Users\Admin\AppData\Local\Temp\e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Admin\AppData\Local\Temp\e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe
      "C:\Users\Admin\AppData\Local\Temp\e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe"
      2⤵
      • Enumerates system info in registry
      PID:5076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/556-132-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/5076-133-0x0000000000000000-mapping.dmp