Analysis

  • max time kernel
    111s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2022, 06:32

General

  • Target

    bd8fe114a160d24ceeff4953f935eca55eec09bf3b6f74e618de06b2eb5a8290.exe

  • Size

    1.3MB

  • MD5

    9234e8c15dfcb950ad7a5926e54c1d9a

  • SHA1

    bf56c217c053b9627dd28b7979b0d641ffceb27b

  • SHA256

    bd8fe114a160d24ceeff4953f935eca55eec09bf3b6f74e618de06b2eb5a8290

  • SHA512

    ef4ef0f50b16107a08887ab889ae3cc4c3becca2391d968b781ca8f924b4b3cde59aca3b26df8d580d527ce8a115c34e616928f282c458fd357bc9ef17ea72af

  • SSDEEP

    24576:JDASdSysJOcj0VQpWbl7s2LP0CXuiAayiWASALUgv2j6R6XEVeRs9HgVfgN:OSQtk2zQytkgis6yx2

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd8fe114a160d24ceeff4953f935eca55eec09bf3b6f74e618de06b2eb5a8290.exe
    "C:\Users\Admin\AppData\Local\Temp\bd8fe114a160d24ceeff4953f935eca55eec09bf3b6f74e618de06b2eb5a8290.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\AppData\Local\Temp\bd8fe114a160d24ceeff4953f935eca55eec09bf3b6f74e618de06b2eb5a8290.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1776

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1776-133-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1776-134-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1776-135-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1776-136-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1776-137-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB