Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 01:34

General

  • Target

    8d5b6d5f81d07b115c674d19e5b891607f5466cf894c11c614ca57fe675a93b3.exe

  • Size

    188KB

  • MD5

    a505975f28aaf6a745d88c0dc44bb5e0

  • SHA1

    bee4abdc984073dedd9b93eb7b68baf7a4996932

  • SHA256

    8d5b6d5f81d07b115c674d19e5b891607f5466cf894c11c614ca57fe675a93b3

  • SHA512

    b0f446a07d9f76bd3fbaea4afc58212b2cea9fc3e1195ea4de3e2f0b3e6067b0de0706f1a2fe1c3afee78f36b41f521716ff7cc31bb6f856d2290c0788c377af

  • SSDEEP

    3072:eNSybeojpusKqhzY1PQ6QEOVsH5bq+2dlNwEqe3zhfJ3w147oyWLi6dDP3:eNSybCqaPQ6hNq+Ipqe3zhSUxAi6V/

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d5b6d5f81d07b115c674d19e5b891607f5466cf894c11c614ca57fe675a93b3.exe
    "C:\Users\Admin\AppData\Local\Temp\8d5b6d5f81d07b115c674d19e5b891607f5466cf894c11c614ca57fe675a93b3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\8d5b6d5f81d07b115c674d19e5b891607f5466cf894c11c614ca57fe675a93b3.exe
      "C:\Users\Admin\AppData\Local\Temp\8d5b6d5f81d07b115c674d19e5b891607f5466cf894c11c614ca57fe675a93b3.exe"
      2⤵
        PID:1204

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1204-55-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1204-56-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1204-58-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1204-59-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1204-61-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1204-65-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2016-54-0x0000000075661000-0x0000000075663000-memory.dmp

      Filesize

      8KB