Analysis

  • max time kernel
    243s
  • max time network
    272s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 07:48

General

  • Target

    5480d445463bc0d3394fe530cf3432f1580f4946a4d9546e5b0806312b0ba26f.exe

  • Size

    3.3MB

  • MD5

    2f659e2106fba20995d5e0ac507327cb

  • SHA1

    70ce6c75a7ac3d161b619b2173b44caccf3d6766

  • SHA256

    5480d445463bc0d3394fe530cf3432f1580f4946a4d9546e5b0806312b0ba26f

  • SHA512

    931e0c993255743dd50f9040962a9689102f57e02ad0ce7776d109f972d4b48bdd413dc1c3d06ef18b02bd9a6dd0497a7604df1a182023f669e0a4b64f3adb6b

  • SSDEEP

    49152:XVg5tQ7a4+u5nW59NeEEsuteuw/XqU3WrC+O8KoR1PoO2+4vN27rdzwojaEtVGSl:lg56785nLzceuuAC6C27Bzi6GE

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5480d445463bc0d3394fe530cf3432f1580f4946a4d9546e5b0806312b0ba26f.exe
    "C:\Users\Admin\AppData\Local\Temp\5480d445463bc0d3394fe530cf3432f1580f4946a4d9546e5b0806312b0ba26f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Users\Admin\AppData\Local\Temp\5480d445463bc0d3394fe530cf3432f1580f4946a4d9546e5b0806312b0ba26f.exe
      "C:\Users\Admin\AppData\Local\Temp\5480d445463bc0d3394fe530cf3432f1580f4946a4d9546e5b0806312b0ba26f.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      PID:3884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3884-133-0x0000000000C00000-0x0000000000E68000-memory.dmp

    Filesize

    2.4MB

  • memory/3884-134-0x0000000000C00000-0x0000000000E68000-memory.dmp

    Filesize

    2.4MB

  • memory/3884-135-0x0000000000C00000-0x0000000000E68000-memory.dmp

    Filesize

    2.4MB

  • memory/3884-136-0x0000000000C00000-0x0000000000E68000-memory.dmp

    Filesize

    2.4MB

  • memory/3884-137-0x0000000000C00000-0x0000000000E68000-memory.dmp

    Filesize

    2.4MB