Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:40

General

  • Target

    6500f4ead40e519e5783cdc39c46c27584c6afabaed344f3912953d7116f1470.exe

  • Size

    1.3MB

  • MD5

    bad9f396ca8f03e743679bd8470a6c0a

  • SHA1

    218263651e93a60f1f4b08e5a92b5184e08bbb36

  • SHA256

    6500f4ead40e519e5783cdc39c46c27584c6afabaed344f3912953d7116f1470

  • SHA512

    649828a50eb80a53c4a73ae52dd09e0b93049dc483e00e39a3ba304eff3d677f59409cf6faa102f3615d7f11170674accde69009ce7d3004b34884692c55c468

  • SSDEEP

    24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaks:7rKo4ZwCOnYjVmJPaj

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6500f4ead40e519e5783cdc39c46c27584c6afabaed344f3912953d7116f1470.exe
    "C:\Users\Admin\AppData\Local\Temp\6500f4ead40e519e5783cdc39c46c27584c6afabaed344f3912953d7116f1470.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Users\Admin\AppData\Local\Temp\6500f4ead40e519e5783cdc39c46c27584c6afabaed344f3912953d7116f1470.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1892-132-0x0000000000000000-mapping.dmp

  • memory/1892-133-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1892-134-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1892-135-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1892-136-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1892-137-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1892-138-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB