Analysis

  • max time kernel
    81s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 09:27

General

  • Target

    121ae9e466bd6c6a1227e19bf6c8348ffa099380e20f31071acaeadf4fd4b3fa.exe

  • Size

    384KB

  • MD5

    e6db38cb1478e03cac0538f419fe2665

  • SHA1

    02aaac021018b2dab2437febacf6bd98a613cd34

  • SHA256

    121ae9e466bd6c6a1227e19bf6c8348ffa099380e20f31071acaeadf4fd4b3fa

  • SHA512

    2fec0ac4dfc6bfdae0adebc295b0853b2fad40872025683d8496509263021394cc89e583e0c5ade5b9ca0c3b8ce34d265a9fd531bf76b901c4a38f1819b96263

  • SSDEEP

    6144:8cIvPZigUI7RSEYmmGrvzMLkeYSDrqxCyfk14nVif9nLdksoK1Vg0cU/4vxf3e0f:or7R0ybUYkrUCyfk14nkRLdJRXA5W0f

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\121ae9e466bd6c6a1227e19bf6c8348ffa099380e20f31071acaeadf4fd4b3fa.exe
    "C:\Users\Admin\AppData\Local\Temp\121ae9e466bd6c6a1227e19bf6c8348ffa099380e20f31071acaeadf4fd4b3fa.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\121ae9e466bd6c6a1227e19bf6c8348ffa099380e20f31071acaeadf4fd4b3fa.exe
      "C:\Users\Admin\AppData\Local\Temp\121ae9e466bd6c6a1227e19bf6c8348ffa099380e20f31071acaeadf4fd4b3fa.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1708-54-0x0000000075451000-0x0000000075453000-memory.dmp

    Filesize

    8KB

  • memory/1712-57-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1712-58-0x00000000004112DC-mapping.dmp

  • memory/1712-61-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1712-62-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1712-63-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB