Analysis

  • max time kernel
    43s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 04:22

General

  • Target

    a0ede724a4bfe282e5562224c936695ec1c53c80f237691763d0c12c5c5b5187.exe

  • Size

    315KB

  • MD5

    8efd9f184013f1b9e86144352e2ab255

  • SHA1

    ece1d67613ad0387293e0e9bb7b1cc1667a0d810

  • SHA256

    a0ede724a4bfe282e5562224c936695ec1c53c80f237691763d0c12c5c5b5187

  • SHA512

    707253a787ce7872bcb2947cc68fa2a92157e7c5f0bc72e9dbd6fc5a682189fd045a5d21d795576265187b76539f1f45fb6cf0c94f4559034568018add2e59b9

  • SSDEEP

    6144:01vC2F8NXC796TB9vj48F5/YxnGKQPCMyxaRP01xvYcsNK:MteVQkTrvj4m5/YxnGKQPCnx4gxvYcsU

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1224
      • C:\Users\Admin\AppData\Local\Temp\a0ede724a4bfe282e5562224c936695ec1c53c80f237691763d0c12c5c5b5187.exe
        "C:\Users\Admin\AppData\Local\Temp\a0ede724a4bfe282e5562224c936695ec1c53c80f237691763d0c12c5c5b5187.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Users\Admin\AppData\Local\Temp\a0ede724a4bfe282e5562224c936695ec1c53c80f237691763d0c12c5c5b5187.exe
          C:\Users\Admin\AppData\Local\Temp\a0ede724a4bfe282e5562224c936695ec1c53c80f237691763d0c12c5c5b5187.exe
          3⤵
            PID:112
          • C:\Users\Admin\AppData\Local\Temp\a0ede724a4bfe282e5562224c936695ec1c53c80f237691763d0c12c5c5b5187.exe
            C:\Users\Admin\AppData\Local\Temp\a0ede724a4bfe282e5562224c936695ec1c53c80f237691763d0c12c5c5b5187.exe
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:544

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/544-58-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/544-59-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/544-61-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/544-62-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/544-66-0x0000000000400000-0x0000000000408960-memory.dmp

        Filesize

        34KB

      • memory/544-71-0x0000000010000000-0x0000000010013000-memory.dmp

        Filesize

        76KB

      • memory/1224-68-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

        Filesize

        28KB

      • memory/1712-54-0x0000000000330000-0x000000000036A000-memory.dmp

        Filesize

        232KB

      • memory/1712-57-0x00000000765B1000-0x00000000765B3000-memory.dmp

        Filesize

        8KB

      • memory/1712-65-0x0000000074990000-0x0000000074F3B000-memory.dmp

        Filesize

        5.7MB