Analysis

  • max time kernel
    14s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:21

General

  • Target

    2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe

  • Size

    1.6MB

  • MD5

    e4daebfdd8cb53fa9b20a525cff64450

  • SHA1

    35252f3f17baeb25098094e2613b95e222a71858

  • SHA256

    2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef

  • SHA512

    b5764ed29f72a64f4f440596b00ce33446820c9dae096af5ac7371cace09e8a60d3fca819a73c8e3a51587a0608513984daeff5477194f907cc190eb75a66339

  • SSDEEP

    24576:BzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYc:T6/ye0PIphrp9Zuvjqa0Uidj

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe
    "C:\Users\Admin\AppData\Local\Temp\2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe
      "C:\Users\Admin\AppData\Local\Temp\2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1648-54-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1648-55-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1648-57-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1648-59-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1648-61-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1648-63-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1648-65-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1648-66-0x000000000045304C-mapping.dmp

  • memory/1648-68-0x00000000757B1000-0x00000000757B3000-memory.dmp

    Filesize

    8KB

  • memory/1648-69-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1648-70-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1648-72-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB