Analysis

  • max time kernel
    51s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 14:57

General

  • Target

    cd3cd83f0be17b73d794a9e3c54ed047a33db73e9b3c55353ace295a7c679798.exe

  • Size

    561KB

  • MD5

    ca778554681f8096250e28054f2a56be

  • SHA1

    f5f1230fb803e5b2c6d62fecace961d15cf6799c

  • SHA256

    cd3cd83f0be17b73d794a9e3c54ed047a33db73e9b3c55353ace295a7c679798

  • SHA512

    2e411d9f89b00c4e199b99ce50c7d353251a8a50339a4749fcd1fa2ba18d37814d0ad98e015c4437aef4457555a3aee79d8d0119faa71af6cb0cfe2fa9376ab2

  • SSDEEP

    12288:8JRYT/jA1+FSpwPpwHd+3anVKB7myuK0bcNb2amWsW/:Z/RF4wPid+qbyxkat1/

Score
6/10

Malware Config

Signatures

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd3cd83f0be17b73d794a9e3c54ed047a33db73e9b3c55353ace295a7c679798.exe
    "C:\Users\Admin\AppData\Local\Temp\cd3cd83f0be17b73d794a9e3c54ed047a33db73e9b3c55353ace295a7c679798.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\cd3cd83f0be17b73d794a9e3c54ed047a33db73e9b3c55353ace295a7c679798.exe
      "C:\Users\Admin\AppData\Local\Temp\cd3cd83f0be17b73d794a9e3c54ed047a33db73e9b3c55353ace295a7c679798.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1208-54-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB

  • memory/1208-56-0x0000000000250000-0x0000000000255000-memory.dmp

    Filesize

    20KB

  • memory/1608-58-0x0000000000400000-0x0000000000609000-memory.dmp

    Filesize

    2.0MB