Analysis

  • max time kernel
    143s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 16:53

General

  • Target

    b809d21cbc2d5451de59dc538ef33ab1796e0449df58dd58ecd79210601ab764.exe

  • Size

    281KB

  • MD5

    71857de3c9ec004fd466a892fba58716

  • SHA1

    717259f364cdd3dc64fd7dada1f28fa48b4dd98c

  • SHA256

    b809d21cbc2d5451de59dc538ef33ab1796e0449df58dd58ecd79210601ab764

  • SHA512

    886e02fad0ce12d1c7e0e594e16da33d7f3a043f0a056370eedef2552505195857848a4b8b6014e902d43a8f3aa45aee83f427c1d2adc02c8a4d2b23f6a09212

  • SSDEEP

    6144:auiyZuLNeVJVkIRqbFHUiC8iKTZ2mfzSp4Dk:ziym8jV6hji+LGO4

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b809d21cbc2d5451de59dc538ef33ab1796e0449df58dd58ecd79210601ab764.exe
    "C:\Users\Admin\AppData\Local\Temp\b809d21cbc2d5451de59dc538ef33ab1796e0449df58dd58ecd79210601ab764.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Users\Admin\AppData\Local\Temp\b809d21cbc2d5451de59dc538ef33ab1796e0449df58dd58ecd79210601ab764.exe
      "C:\Users\Admin\AppData\Local\Temp\b809d21cbc2d5451de59dc538ef33ab1796e0449df58dd58ecd79210601ab764.exe"
      2⤵
        PID:3448

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3448-133-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/3448-135-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB