Analysis

  • max time kernel
    322s
  • max time network
    357s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:30

General

  • Target

    8cfb7bb6c46afed3aeca44a069db1e12b0c66f5f9b9f3a331702c3264c6181f2.exe

  • Size

    1.3MB

  • MD5

    43f46e257ff2e8baeeb4150cb933911f

  • SHA1

    c1a301385e21e34041e2c7bee77d81c51160f21d

  • SHA256

    8cfb7bb6c46afed3aeca44a069db1e12b0c66f5f9b9f3a331702c3264c6181f2

  • SHA512

    18f761ef167568039bb80fecb7d13e77d95fa93e9f68b2f572ad4bc0768fb7f44bda3af0253e33ff4e46c2e73b09ed11e76a5753b24ad7ddec4c164db95c73bc

  • SSDEEP

    24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:jrKo4ZwCOnYjVmJPa

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cfb7bb6c46afed3aeca44a069db1e12b0c66f5f9b9f3a331702c3264c6181f2.exe
    "C:\Users\Admin\AppData\Local\Temp\8cfb7bb6c46afed3aeca44a069db1e12b0c66f5f9b9f3a331702c3264c6181f2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Users\Admin\AppData\Local\Temp\8cfb7bb6c46afed3aeca44a069db1e12b0c66f5f9b9f3a331702c3264c6181f2.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:3852

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3852-132-0x0000000000000000-mapping.dmp

  • memory/3852-133-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/3852-134-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/3852-135-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/3852-136-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB