Analysis

  • max time kernel
    43s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 20:36 UTC

General

  • Target

    1e008b847807c7fb8cd581246fc78cfc4c44c3435f39e22d8d6ee3d61f00b939.exe

  • Size

    52KB

  • MD5

    0dcb3d54e95b44f1342b6c5a93f320d8

  • SHA1

    0d85048b0b495afe5e5c7744bfbdce0c99b9669d

  • SHA256

    1e008b847807c7fb8cd581246fc78cfc4c44c3435f39e22d8d6ee3d61f00b939

  • SHA512

    6bbc8d1f49c334c34315629f788570919911c4ceff7412d61054279e4a61fa2d59e8761b508bccb2b6eeb527f11fec6dbdaf1f16e730ad6b95b05d50e06dd726

  • SSDEEP

    768:2NrD6HOuQYNPpuYnWzdyXmaKlNd1PPVsF1PcpdR:2N/6HDpruhxpu03R

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e008b847807c7fb8cd581246fc78cfc4c44c3435f39e22d8d6ee3d61f00b939.exe
    "C:\Users\Admin\AppData\Local\Temp\1e008b847807c7fb8cd581246fc78cfc4c44c3435f39e22d8d6ee3d61f00b939.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\1e008b847807c7fb8cd581246fc78cfc4c44c3435f39e22d8d6ee3d61f00b939.exe
      f|
      2⤵
      • Maps connected drives based on registry
      • Suspicious use of SetWindowsHookEx
      PID:980

Network

  • flag-us
    DNS
    13223.mkdns.eu
    1e008b847807c7fb8cd581246fc78cfc4c44c3435f39e22d8d6ee3d61f00b939.exe
    Remote address:
    8.8.8.8:53
    Request
    13223.mkdns.eu
    IN A
    Response
No results found
  • 8.8.8.8:53
    13223.mkdns.eu
    dns
    1e008b847807c7fb8cd581246fc78cfc4c44c3435f39e22d8d6ee3d61f00b939.exe
    60 B
    114 B
    1
    1

    DNS Request

    13223.mkdns.eu

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/980-56-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/980-59-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/980-63-0x0000000075B41000-0x0000000075B43000-memory.dmp

    Filesize

    8KB

  • memory/980-64-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.