Analysis

  • max time kernel
    3s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 04:09

General

  • Target

    5daa18e8d527bcb1577bb294b3550452dda5a132e8f7a88aa4403e487930be1f.exe

  • Size

    237KB

  • MD5

    488860a0479b95d589947b95d8a66ed0

  • SHA1

    1b07d43f56fa9b0e4d8bb5cca2036824953b1451

  • SHA256

    5daa18e8d527bcb1577bb294b3550452dda5a132e8f7a88aa4403e487930be1f

  • SHA512

    d558895986221942d50d9f42fb33dd9b6ea3779aaef51b878509da2aa4f89d9e03207b31b130e772380995e91b7b480aae6e00f059052860700604b1cd509dc1

  • SSDEEP

    6144:3NTg6qjmDFFOTCNtQa4G+oksDUaLlq0bH:dHqjAzQyr4Joks1pqu

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5daa18e8d527bcb1577bb294b3550452dda5a132e8f7a88aa4403e487930be1f.exe
    "C:\Users\Admin\AppData\Local\Temp\5daa18e8d527bcb1577bb294b3550452dda5a132e8f7a88aa4403e487930be1f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\5daa18e8d527bcb1577bb294b3550452dda5a132e8f7a88aa4403e487930be1f.exe
      "C:\Users\Admin\AppData\Local\Temp\5daa18e8d527bcb1577bb294b3550452dda5a132e8f7a88aa4403e487930be1f.exe"
      2⤵
        PID:1756

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1756-54-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1756-55-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1756-56-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/1756-59-0x0000000075291000-0x0000000075293000-memory.dmp

      Filesize

      8KB

    • memory/1756-60-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB