Analysis

  • max time kernel
    302s
  • max time network
    317s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:05

General

  • Target

    595ba979fac2eac505b06826139ae069ed0b0bd68c0a0c90d8d623ba719840ea.exe

  • Size

    96KB

  • MD5

    23bccade47c707324f1138095ce2e4a4

  • SHA1

    855d78081a4b3e4a53218cf51d72e1b8e1e2858a

  • SHA256

    595ba979fac2eac505b06826139ae069ed0b0bd68c0a0c90d8d623ba719840ea

  • SHA512

    3f1c14fbe028c28a548bd42a385fc232efb291409b6475341dc014a908ccb4276b73565959cd959eda413d6a77a8ced74bb3988581f99d2c2c23c5c9dbd4193e

  • SSDEEP

    1536:O2EjjOR9QTplSAA3RPrttttttttP+eltaEAYLagrZJn9sNrQyStB1es:ujjWa2HRlt9rZvi1o3es

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\595ba979fac2eac505b06826139ae069ed0b0bd68c0a0c90d8d623ba719840ea.exe
    "C:\Users\Admin\AppData\Local\Temp\595ba979fac2eac505b06826139ae069ed0b0bd68c0a0c90d8d623ba719840ea.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Local\Temp\595ba979fac2eac505b06826139ae069ed0b0bd68c0a0c90d8d623ba719840ea.exe
      C:\Users\Admin\AppData\Local\Temp\595ba979fac2eac505b06826139ae069ed0b0bd68c0a0c90d8d623ba719840ea.exe
      2⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SYSTEM32\svchost.exe
        3⤵
          PID:4272

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1160-136-0x00000000001E0000-0x00000000001E4000-memory.dmp

      Filesize

      16KB

    • memory/2724-132-0x0000000000000000-mapping.dmp

    • memory/2724-133-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/2724-135-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/4272-137-0x0000000000000000-mapping.dmp