Analysis

  • max time kernel
    112s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 08:42

General

  • Target

    f7292df15055662f17d902022bba267f1ea0a5b0395794fca51137c875a106b0.exe

  • Size

    1.5MB

  • MD5

    7c1763df18869d97834ec2a59410dbec

  • SHA1

    d2627b4f10de083fb7f67627c431e59cf4dfccd7

  • SHA256

    f7292df15055662f17d902022bba267f1ea0a5b0395794fca51137c875a106b0

  • SHA512

    624137108dfe2c5fdd947998819425a56b235f477d7a33ba18fd6a0ce934d8306d2c97afe1bb5065de82034b9a669a80c54cf63c5c1811d3f6fe1c3715976992

  • SSDEEP

    24576:1zD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUY+:P6/ye0PIphrp9Zuvjqa0UidZ

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7292df15055662f17d902022bba267f1ea0a5b0395794fca51137c875a106b0.exe
    "C:\Users\Admin\AppData\Local\Temp\f7292df15055662f17d902022bba267f1ea0a5b0395794fca51137c875a106b0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\AppData\Local\Temp\f7292df15055662f17d902022bba267f1ea0a5b0395794fca51137c875a106b0.exe
      "C:\Users\Admin\AppData\Local\Temp\f7292df15055662f17d902022bba267f1ea0a5b0395794fca51137c875a106b0.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4904-133-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/4904-134-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/4904-135-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/4904-136-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/4904-137-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB