Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:25

General

  • Target

    6f8d78840582912b7f5805c637db5ca587f6c6fc715c16456bba03e1b24aa732.exe

  • Size

    1.3MB

  • MD5

    0b6d19cd85a48f1f9b92875df93d52f5

  • SHA1

    963013e9e8bd44ba492e0c4265599ba7369074e4

  • SHA256

    6f8d78840582912b7f5805c637db5ca587f6c6fc715c16456bba03e1b24aa732

  • SHA512

    62e34d6d00f80e5929d7c5cbadf97a52b194e2f77572051270d9ebbec041b7ca2f7584b9daee2ad9b859fd3523dc3df258be764473f85d805dbbb39a68a4972a

  • SSDEEP

    24576:vKyKz4D4ufmwhzA2QoPKCys7JdpmnMlxy9KR8uQcuH:vKVzMNuwIKyoBmnMSURNQn

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f8d78840582912b7f5805c637db5ca587f6c6fc715c16456bba03e1b24aa732.exe
    "C:\Users\Admin\AppData\Local\Temp\6f8d78840582912b7f5805c637db5ca587f6c6fc715c16456bba03e1b24aa732.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\6f8d78840582912b7f5805c637db5ca587f6c6fc715c16456bba03e1b24aa732.exe
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1780-54-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1780-55-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1780-57-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1780-59-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1780-61-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1780-63-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1780-65-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1780-66-0x000000000044D5E3-mapping.dmp

  • memory/1780-68-0x00000000762F1000-0x00000000762F3000-memory.dmp

    Filesize

    8KB

  • memory/1780-69-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1780-70-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1780-72-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB