Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:24

General

  • Target

    88be082341988a47c5f9902ec0584c46e2f6a1f333b09933084d3b90fa3948d5.exe

  • Size

    1.3MB

  • MD5

    9ea5cf0d35a2775d1ff23da7ab1c2929

  • SHA1

    62740a38581fc820cac32bfa46d7387cce9ded11

  • SHA256

    88be082341988a47c5f9902ec0584c46e2f6a1f333b09933084d3b90fa3948d5

  • SHA512

    1115f8bd04627eccf18d0ff4807743197852a9c30dcb96e7405a8f1ddeb288fa99d3f37361855922d69b15ccf0f38ab6a9b54c25479cf5bd157d46ed325df1db

  • SSDEEP

    24576:2KyKz4D4ufmwhzA2QoPKCys7JdpmnMlxy9KR8uQcuD:2KVzMNuwIKyoBmnMSURNQj

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88be082341988a47c5f9902ec0584c46e2f6a1f333b09933084d3b90fa3948d5.exe
    "C:\Users\Admin\AppData\Local\Temp\88be082341988a47c5f9902ec0584c46e2f6a1f333b09933084d3b90fa3948d5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Users\Admin\AppData\Local\Temp\88be082341988a47c5f9902ec0584c46e2f6a1f333b09933084d3b90fa3948d5.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4828

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4828-133-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4828-134-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4828-132-0x0000000000000000-mapping.dmp

  • memory/4828-135-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4828-136-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4828-137-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4828-138-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB