Analysis

  • max time kernel
    200s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 23:05

General

  • Target

    a22cf46a2d8e50ce0b0ea2348f562de430de426b1d25865244c0566cd53d4685.exe

  • Size

    987KB

  • MD5

    c1ef72a3046c94c2384f64434db1d1cd

  • SHA1

    7cf59c1ab89bcd478b4ddae1d7874a56d7dcb045

  • SHA256

    a22cf46a2d8e50ce0b0ea2348f562de430de426b1d25865244c0566cd53d4685

  • SHA512

    15f0fb59b62b94b52e2019d061b65a3dc02583d6d7e06e5e969bb508f6aacca90648734cb295fe05b87c44044697772cc387550d3d3f90b6223e3c82b043b5ba

  • SSDEEP

    24576:jLMoaD1TpxI7HKczk5998wdvwbVmwybcWKsLUy:U1TpOa599tvuToKwUy

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a22cf46a2d8e50ce0b0ea2348f562de430de426b1d25865244c0566cd53d4685.exe
    "C:\Users\Admin\AppData\Local\Temp\a22cf46a2d8e50ce0b0ea2348f562de430de426b1d25865244c0566cd53d4685.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\a22cf46a2d8e50ce0b0ea2348f562de430de426b1d25865244c0566cd53d4685.exe
      "C:\Users\Admin\AppData\Local\Temp\a22cf46a2d8e50ce0b0ea2348f562de430de426b1d25865244c0566cd53d4685.exe" Track="0001001000"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:3896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1716-132-0x0000000000400000-0x000000000057A000-memory.dmp

    Filesize

    1.5MB

  • memory/1716-133-0x00000000006D0000-0x00000000006D3000-memory.dmp

    Filesize

    12KB

  • memory/1716-137-0x0000000000400000-0x000000000057A000-memory.dmp

    Filesize

    1.5MB

  • memory/3896-134-0x0000000000000000-mapping.dmp

  • memory/3896-135-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/3896-136-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/3896-138-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/3896-139-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/3896-140-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB

  • memory/3896-141-0x0000000000400000-0x00000000004EA000-memory.dmp

    Filesize

    936KB