Analysis

  • max time kernel
    234s
  • max time network
    247s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:28

General

  • Target

    8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe

  • Size

    1.3MB

  • MD5

    ee49af31873fbd7288a1cea4f2fbe9b1

  • SHA1

    4ac4eb880cf2ab48acffabaa3079bf55e842fa53

  • SHA256

    8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013

  • SHA512

    492b44dfc9502da65135e74ae173a22bbc3a2c2a0113ee470dd6c9d670b7551b6e4beb7ab37267f2b233830e72102ad5c9f7090e27e55fd416f80634e5f30d2a

  • SSDEEP

    24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakw:TrKo4ZwCOnYjVmJPaz

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe
    "C:\Users\Admin\AppData\Local\Temp\8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4428

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4428-132-0x0000000000000000-mapping.dmp

  • memory/4428-133-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/4428-134-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/4428-135-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/4428-136-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/4428-137-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/4428-138-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB