Analysis

  • max time kernel
    315s
  • max time network
    381s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 16:02

General

  • Target

    a4582f720f7a5fe0ea107da4bd60bef7d3d03fac15ff1c313e932327d41c00cb.exe

  • Size

    1.3MB

  • MD5

    0390dbcdfd59ba290d8dc57669446cf4

  • SHA1

    a53df880b9cd6615e2ea124dcdf2fc443299f1b9

  • SHA256

    a4582f720f7a5fe0ea107da4bd60bef7d3d03fac15ff1c313e932327d41c00cb

  • SHA512

    afb050f85d14c90173bcc0798333ea0bdb6b860e3583c9d5fda9b67c3c09be07d4014a4a6a8ed37002b8864ccbcb1715988006e9c165f83f72ce581a8fbf3943

  • SSDEEP

    24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakc:TrKo4ZwCOnYjVmJPaX

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4582f720f7a5fe0ea107da4bd60bef7d3d03fac15ff1c313e932327d41c00cb.exe
    "C:\Users\Admin\AppData\Local\Temp\a4582f720f7a5fe0ea107da4bd60bef7d3d03fac15ff1c313e932327d41c00cb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3472
    • C:\Users\Admin\AppData\Local\Temp\a4582f720f7a5fe0ea107da4bd60bef7d3d03fac15ff1c313e932327d41c00cb.exe
      2⤵
        PID:1144

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1144-133-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/1144-132-0x0000000000000000-mapping.dmp

    • memory/1144-134-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/1144-135-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB