Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 23:55

General

  • Target

    e05366fa2ff255fd52ebea19a4c21ae1e9b8df320e8373e79e4584fde1803cdc.exe

  • Size

    126KB

  • MD5

    52c1275a62d61ed71cc557774453fd46

  • SHA1

    a829afc50b44c4a839b3c23a3e64e5df94c67eab

  • SHA256

    e05366fa2ff255fd52ebea19a4c21ae1e9b8df320e8373e79e4584fde1803cdc

  • SHA512

    c4bce480da29436734853ed929c0a58c4a5b5c91bf11b20fdc164946c2bb3f470a7287492f4737a071767bab98599106c056bd554e3d32bcd1c7fe3ad4ca18c4

  • SSDEEP

    3072:UMYTJzp0fk7we/WGAcZ29lZBmSIENNw21mo4o0OQ+pmviqHQYP:UMYT70fkURYZ2ZxL1mozpgiqw2

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:744
      • C:\Users\Admin\AppData\Local\Temp\e05366fa2ff255fd52ebea19a4c21ae1e9b8df320e8373e79e4584fde1803cdc.exe
        "C:\Users\Admin\AppData\Local\Temp\e05366fa2ff255fd52ebea19a4c21ae1e9b8df320e8373e79e4584fde1803cdc.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3252
        • C:\Users\Admin\AppData\Local\Temp\e05366fa2ff255fd52ebea19a4c21ae1e9b8df320e8373e79e4584fde1803cdc.exe
          C:\Users\Admin\AppData\Local\Temp\e05366fa2ff255fd52ebea19a4c21ae1e9b8df320e8373e79e4584fde1803cdc.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4964

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/744-141-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB

          • memory/3252-133-0x0000000000030000-0x0000000000033000-memory.dmp

            Filesize

            12KB

          • memory/3252-132-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/3252-139-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/4964-137-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4964-140-0x0000000000400000-0x0000000000408960-memory.dmp

            Filesize

            34KB

          • memory/4964-142-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB