Analysis

  • max time kernel
    36s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 00:58

General

  • Target

    95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe

  • Size

    236KB

  • MD5

    7b3517b826a5d5b0e254ba8e57d972c2

  • SHA1

    3d0a870497e31278c9ed42a55d5cd938f39be889

  • SHA256

    95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1

  • SHA512

    67bb889c24121e0f2fd53d3fc9be091fa4dcc834d27b1614a7937612a14e9b888f8c54d862ba1135dd83eb7afb161d356b673caf6895cfab6c454bff5e2e0382

  • SSDEEP

    3072:QcAk+x+44dia8japi7+z/LYCMuEjKBiTZQaT0HhXxy/xS1wfzf6EHK:Qc52+qapi0/LYC/EjKBiFBEhKjxK

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe
    "C:\Users\Admin\AppData\Local\Temp\95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe
      "C:\Users\Admin\AppData\Local\Temp\95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1220
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1244

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1220-63-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1220-55-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1220-56-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1220-58-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1220-60-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1220-62-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1220-67-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1220-71-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1244-68-0x00000000021E0000-0x00000000021EC000-memory.dmp

      Filesize

      48KB

    • memory/1244-70-0x00000000021E0000-0x00000000021EC000-memory.dmp

      Filesize

      48KB

    • memory/1676-54-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/1676-66-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB