Analysis

  • max time kernel
    154s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 17:35

General

  • Target

    cbeb9f11f46fb888b9128c66033cc2f32723540be3a37fb8b332115d02cfca52.exe

  • Size

    1.1MB

  • MD5

    5b6dc56b0ab0d2ce8b74da617ddc3b62

  • SHA1

    9d5353f5b7e7dedd48f03b3236f73c980cf0fa29

  • SHA256

    cbeb9f11f46fb888b9128c66033cc2f32723540be3a37fb8b332115d02cfca52

  • SHA512

    65d1ac92273c4fd437096397af81e0d211e93b0e278d236c10e00260008eed8eb1aba3d441095933d1291af84ed9face179b63425e15d8dcb65f51d2e06c4f72

  • SSDEEP

    24576:fddg/E7bCmsjOIK136PChmraBPpwQuiyIakELopK9KmXwvToW5K:fDg/f8KPChJlrL8owKbvxU

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2740
      • C:\Users\Admin\AppData\Local\Temp\cbeb9f11f46fb888b9128c66033cc2f32723540be3a37fb8b332115d02cfca52.exe
        "C:\Users\Admin\AppData\Local\Temp\cbeb9f11f46fb888b9128c66033cc2f32723540be3a37fb8b332115d02cfca52.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:384
        • C:\Users\Admin\AppData\Local\Temp\cbeb9f11f46fb888b9128c66033cc2f32723540be3a37fb8b332115d02cfca52.exe
          C:\Users\Admin\AppData\Local\Temp\cbeb9f11f46fb888b9128c66033cc2f32723540be3a37fb8b332115d02cfca52.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1968

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/384-132-0x0000000000400000-0x0000000000942000-memory.dmp

            Filesize

            5.3MB

          • memory/384-138-0x0000000000400000-0x0000000000942000-memory.dmp

            Filesize

            5.3MB

          • memory/1968-136-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1968-139-0x0000000000400000-0x0000000000408960-memory.dmp

            Filesize

            34KB

          • memory/1968-141-0x0000000010000000-0x0000000010013000-memory.dmp

            Filesize

            76KB

          • memory/2740-140-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

            Filesize

            28KB