Analysis

  • max time kernel
    201s
  • max time network
    224s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:55

General

  • Target

    c7282cf4279be403dd5e7ba6a63d2e3cb59d33686885384de3b5635b0a4c492e.exe

  • Size

    104KB

  • MD5

    5bf6f3ec6c21e2ab6e67134f38275e4e

  • SHA1

    c16b7849726061df7367124d5a264b86c43d996c

  • SHA256

    c7282cf4279be403dd5e7ba6a63d2e3cb59d33686885384de3b5635b0a4c492e

  • SHA512

    3c024722779ebbb35a8942ead69b9ede9e0b7f4d7649143710dbf65ddec96320b343e9879d5a6ca57c3e308972c5e86aa8f3690a8ddecee88f1ba8548384fb6c

  • SSDEEP

    1536:uTkEe8rn91K+XOdkq/2kWKs0zuhos3P/UZfyeDbXck7wuw2t6rLWNp:uTkEeu1Kbky2Ph0zEos3UBygkZ2k

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7282cf4279be403dd5e7ba6a63d2e3cb59d33686885384de3b5635b0a4c492e.exe
    "C:\Users\Admin\AppData\Local\Temp\c7282cf4279be403dd5e7ba6a63d2e3cb59d33686885384de3b5635b0a4c492e.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Users\Admin\AppData\Local\Temp\c7282cf4279be403dd5e7ba6a63d2e3cb59d33686885384de3b5635b0a4c492e.exe
      "C:\Users\Admin\AppData\Local\Temp\c7282cf4279be403dd5e7ba6a63d2e3cb59d33686885384de3b5635b0a4c492e.exe"
      2⤵
        PID:1520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1520-134-0x0000000000000000-mapping.dmp

    • memory/1520-135-0x0000000001000000-0x0000000001014000-memory.dmp

      Filesize

      80KB

    • memory/1520-136-0x0000000001000000-0x0000000001014000-memory.dmp

      Filesize

      80KB

    • memory/1520-137-0x0000000001000000-0x0000000001014000-memory.dmp

      Filesize

      80KB

    • memory/1520-138-0x0000000001000000-0x0000000001014000-memory.dmp

      Filesize

      80KB