Analysis

  • max time kernel
    20s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 12:13

General

  • Target

    d12d177798c110abe3ea0e2afc99b0c37e0f2026438e4d731925321c8e27cdb6.exe

  • Size

    1.5MB

  • MD5

    c69ca3facd4a14db4a9a779599ddcd15

  • SHA1

    39dd85ebd0ed764a64ea95fd94f045424ad247fe

  • SHA256

    d12d177798c110abe3ea0e2afc99b0c37e0f2026438e4d731925321c8e27cdb6

  • SHA512

    fc22475ef6e619e6f08f2517568c136c7ef57cf6fe8b3fffc87dc97eb0f3ee8a0faf7d90205b764ebcbea71a1a36d7dd21aaac0bac449bd6e56e6d886a81fea0

  • SSDEEP

    24576:lzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYP:/6/ye0PIphrp9Zuvjqa0Uidm

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d12d177798c110abe3ea0e2afc99b0c37e0f2026438e4d731925321c8e27cdb6.exe
    "C:\Users\Admin\AppData\Local\Temp\d12d177798c110abe3ea0e2afc99b0c37e0f2026438e4d731925321c8e27cdb6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\d12d177798c110abe3ea0e2afc99b0c37e0f2026438e4d731925321c8e27cdb6.exe
      "C:\Users\Admin\AppData\Local\Temp\d12d177798c110abe3ea0e2afc99b0c37e0f2026438e4d731925321c8e27cdb6.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1196-54-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-55-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-57-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-59-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-61-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-63-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-65-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-66-0x000000000045304C-mapping.dmp

  • memory/1196-68-0x0000000076691000-0x0000000076693000-memory.dmp

    Filesize

    8KB

  • memory/1196-69-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-70-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-72-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1196-73-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB