Analysis

  • max time kernel
    46s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 19:56

General

  • Target

    a7f2d588cef3fea959dbc063ca763aff01c97bbe7498c3e66c9baedcf3da2113.exe

  • Size

    72KB

  • MD5

    08f3eb0f10f97bba090526b24f60c9c2

  • SHA1

    8dcb0a961d27a2fa5667bba765dc2ae6f50f79f4

  • SHA256

    a7f2d588cef3fea959dbc063ca763aff01c97bbe7498c3e66c9baedcf3da2113

  • SHA512

    6e39edbdc8dc35bb198b0ba6b3f2726a5b65811f2ec69317daacbb815680e9e6190c713ca31d289f084cb73fdc3503a8e534fa301583a89942e10e1d82be2e9b

  • SSDEEP

    1536:SMP5Jrvb/GUPMWLpbQ/UTO7TkiU9OAA5:1rvbeUrcclXM3

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\a7f2d588cef3fea959dbc063ca763aff01c97bbe7498c3e66c9baedcf3da2113.exe
        "C:\Users\Admin\AppData\Local\Temp\a7f2d588cef3fea959dbc063ca763aff01c97bbe7498c3e66c9baedcf3da2113.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Users\Admin\AppData\Local\Temp\a7f2d588cef3fea959dbc063ca763aff01c97bbe7498c3e66c9baedcf3da2113.exe
          "C:\Users\Admin\AppData\Local\Temp\a7f2d588cef3fea959dbc063ca763aff01c97bbe7498c3e66c9baedcf3da2113.exe"
          3⤵
          • Drops startup file
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:852

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/852-57-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/852-61-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/852-64-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/1208-62-0x0000000002490000-0x0000000002493000-memory.dmp

            Filesize

            12KB

          • memory/1600-54-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/1600-55-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB

          • memory/1600-56-0x00000000752B1000-0x00000000752B3000-memory.dmp

            Filesize

            8KB

          • memory/1600-60-0x0000000000400000-0x000000000041D000-memory.dmp

            Filesize

            116KB