Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 07:30

General

  • Target

    c560fa7e684b1c445547f0e93ea0a9170a7ca4b1e7f841877575ec5ceb920781.exe

  • Size

    439KB

  • MD5

    2f48c3c6f9807647937d5fe64a57d702

  • SHA1

    72d3d007a7d4d7fa60fa2c45347ed78528419df1

  • SHA256

    c560fa7e684b1c445547f0e93ea0a9170a7ca4b1e7f841877575ec5ceb920781

  • SHA512

    07f859f84f23fe28549071d4e5a775b8f813c94f486823d8fb22f0a7696e9a38572e8fc643412c10157893565b544747ce2159dfdd68543b8eca52ddcfb3ab30

  • SSDEEP

    12288:4GLOt1zmv5EEBmC6NtRZW+Yiv8nAJUAqb:4zt1dtjWadJI

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c560fa7e684b1c445547f0e93ea0a9170a7ca4b1e7f841877575ec5ceb920781.exe
    "C:\Users\Admin\AppData\Local\Temp\c560fa7e684b1c445547f0e93ea0a9170a7ca4b1e7f841877575ec5ceb920781.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Users\Admin\AppData\Local\Temp\c560fa7e684b1c445547f0e93ea0a9170a7ca4b1e7f841877575ec5ceb920781.exe
      C:\Users\Admin\AppData\Local\Temp\c560fa7e684b1c445547f0e93ea0a9170a7ca4b1e7f841877575ec5ceb920781.exe
      2⤵
        PID:1480

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1480-54-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-55-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-57-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-60-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-63-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-66-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-69-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-72-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-74-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-77-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-80-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-83-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1480-86-0x00000000758B1000-0x00000000758B3000-memory.dmp

      Filesize

      8KB

    • memory/1480-87-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB