Analysis

  • max time kernel
    183s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 18:12

General

  • Target

    49b60c5f691b2bf6d74fc7ec07c218c1e37df265c15fdccc5c101c3ab55e6abb.exe

  • Size

    1.3MB

  • MD5

    d6306946ceadc6ac5e38474c9a8c0cfc

  • SHA1

    b393324c31bdd7f10424616bbf241fa2de4a3f18

  • SHA256

    49b60c5f691b2bf6d74fc7ec07c218c1e37df265c15fdccc5c101c3ab55e6abb

  • SHA512

    5929ab9d14928f69f85184c910589d79d520f7afd1e52e752616a6303342d9056b77e0e981df844fea785b75031673363d826ddc20b76522d8544d4482110000

  • SSDEEP

    24576:+uq2tmafPHRCOfLIRT26ULQX+llih7yzs905h0OsYOl9ooM3hGrBswDNgJ:kaHPixOa9puh

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49b60c5f691b2bf6d74fc7ec07c218c1e37df265c15fdccc5c101c3ab55e6abb.exe
    "C:\Users\Admin\AppData\Local\Temp\49b60c5f691b2bf6d74fc7ec07c218c1e37df265c15fdccc5c101c3ab55e6abb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Users\Admin\AppData\Local\Temp\49b60c5f691b2bf6d74fc7ec07c218c1e37df265c15fdccc5c101c3ab55e6abb.exe
      "C:\Users\Admin\AppData\Local\Temp\49b60c5f691b2bf6d74fc7ec07c218c1e37df265c15fdccc5c101c3ab55e6abb.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1420

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1420-133-0x0000000000400000-0x00000000004E7000-memory.dmp

    Filesize

    924KB

  • memory/1420-134-0x0000000000400000-0x00000000004E7000-memory.dmp

    Filesize

    924KB

  • memory/1420-135-0x0000000000400000-0x00000000004E7000-memory.dmp

    Filesize

    924KB

  • memory/1420-136-0x0000000000400000-0x00000000004E7000-memory.dmp

    Filesize

    924KB

  • memory/1420-137-0x0000000000400000-0x00000000004E7000-memory.dmp

    Filesize

    924KB