Analysis

  • max time kernel
    57s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 01:54

General

  • Target

    21c960cc374aba5070ce68700f9ed31280484dcb9e995c93308cb3f537a153c7.exe

  • Size

    1.2MB

  • MD5

    2e0ee01d6eca99c95c0b6031d1099c32

  • SHA1

    6742c18e987704e85a455b722ed2ed4c01a3a68e

  • SHA256

    21c960cc374aba5070ce68700f9ed31280484dcb9e995c93308cb3f537a153c7

  • SHA512

    b1f4a9ca022936ef4079655098b2160f967c1af197a74d1d0bf577feb27a0751cc0f4812a3c5a1cfd7cf9289f15bf9a83aeb7736c0c0ceab299070227c901547

  • SSDEEP

    24576:PpEdL1+miBQxprjUQftJLpV1VnaLcpI4Ig+JxMF:xEqmvxD3pRaLcZIg+G

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21c960cc374aba5070ce68700f9ed31280484dcb9e995c93308cb3f537a153c7.exe
    "C:\Users\Admin\AppData\Local\Temp\21c960cc374aba5070ce68700f9ed31280484dcb9e995c93308cb3f537a153c7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\21c960cc374aba5070ce68700f9ed31280484dcb9e995c93308cb3f537a153c7.exe
      "C:\Users\Admin\AppData\Local\Temp\21c960cc374aba5070ce68700f9ed31280484dcb9e995c93308cb3f537a153c7.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2040

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2040-54-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-55-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-57-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-59-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-61-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-63-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-65-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-68-0x0000000076381000-0x0000000076383000-memory.dmp

          Filesize

          8KB

        • memory/2040-69-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-70-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-71-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB

        • memory/2040-73-0x0000000000400000-0x00000000004DF000-memory.dmp

          Filesize

          892KB