Analysis

  • max time kernel
    29s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:08

General

  • Target

    3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe

  • Size

    59KB

  • MD5

    f77e9b212ff7f353c6bbc23355b15c73

  • SHA1

    ec320a5a8e5c3cce08eab051c3707ec801c77f8f

  • SHA256

    3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee

  • SHA512

    9b1c16de403f22616bff728ef6df5bd4613b6c282d59ef47e633902cc80d9ed85dad6d033649b5a0357c002a6116a2912a2f2f9c2e926a98cd87d6d71973aa05

  • SSDEEP

    1536:FyyR9IUrTZeGD525DFtYLV2iL6OGuF1h1nPXYvdg8lkVFj/Q:FyyRtrteGD+Hsh6efIvR4u

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe
        "C:\Users\Admin\AppData\Local\Temp\3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:904
        • C:\Users\Admin\AppData\Local\Temp\3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe
          "C:\Users\Admin\AppData\Local\Temp\3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe"
          3⤵
          • Drops startup file
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1380

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/904-55-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/904-54-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/904-56-0x0000000075021000-0x0000000075023000-memory.dmp

            Filesize

            8KB

          • memory/904-60-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/1244-62-0x0000000002230000-0x0000000002233000-memory.dmp

            Filesize

            12KB

          • memory/1380-57-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/1380-61-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/1380-64-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB