Analysis

  • max time kernel
    91s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2022 15:04

General

  • Target

    c48a36e4019b0af79e981c0796994c016890fc11e7e06dd75fe97f23242aa055.exe

  • Size

    35KB

  • MD5

    0c7c1ab9e11debbe6148124ce713c6a8

  • SHA1

    43d88a9a56a4401b4345869780da5fb227998f42

  • SHA256

    c48a36e4019b0af79e981c0796994c016890fc11e7e06dd75fe97f23242aa055

  • SHA512

    4d21d3c27326ba3fe1d45eb0c6aaac867afd112bd775f2f161e29cf5b9ead5764eeacbd17973598788d3f6d556ab4b041c889a1501f36782ebb143026da1aeb4

  • SSDEEP

    768:lCSr3Ome2Om19VtFtkMYlIxEq+BeuOV1jeYFZgsYdTW5yAWcUOpsYsu:lCYOme2Om19VtFtkMYlIx/MHOVJnFZge

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c48a36e4019b0af79e981c0796994c016890fc11e7e06dd75fe97f23242aa055.exe
    "C:\Users\Admin\AppData\Local\Temp\c48a36e4019b0af79e981c0796994c016890fc11e7e06dd75fe97f23242aa055.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Users\Admin\AppData\Local\Temp\c48a36e4019b0af79e981c0796994c016890fc11e7e06dd75fe97f23242aa055.exe
      a|
      2⤵
      • Maps connected drives based on registry
      • Suspicious use of SetWindowsHookEx
      PID:4908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4908-134-0x0000000000000000-mapping.dmp

  • memory/4908-135-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4908-137-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4908-140-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4908-142-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB