Analysis

  • max time kernel
    46s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 18:58

General

  • Target

    c8f0f877fb89ad8fc8b40ac1895666c323a91075389a223b7a4c0760942e923f.exe

  • Size

    61KB

  • MD5

    42edb6772f3bc8d9f6c61d3f22b76909

  • SHA1

    8c45a8b66fec61fba370444ec64aa27043515f26

  • SHA256

    c8f0f877fb89ad8fc8b40ac1895666c323a91075389a223b7a4c0760942e923f

  • SHA512

    c8fb3f1f59c13d705a78da66da3c8f1f77130ab064cf895ef8a6b996b7a6f69cc73025298f6c30b6327caa4ae1cbc49d55092d2730d30ce2b7d58afe32a60eb9

  • SSDEEP

    1536:fUXWBU5rdLvSDzxAMdQTCcHqcN4pHYeYKH:uW65lv4A1CcJ49Ye1

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1344
      • C:\Users\Admin\AppData\Local\Temp\c8f0f877fb89ad8fc8b40ac1895666c323a91075389a223b7a4c0760942e923f.exe
        "C:\Users\Admin\AppData\Local\Temp\c8f0f877fb89ad8fc8b40ac1895666c323a91075389a223b7a4c0760942e923f.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Users\Admin\AppData\Local\Temp\c8f0f877fb89ad8fc8b40ac1895666c323a91075389a223b7a4c0760942e923f.exe
          "C:\Users\Admin\AppData\Local\Temp\c8f0f877fb89ad8fc8b40ac1895666c323a91075389a223b7a4c0760942e923f.exe"
          3⤵
          • Drops startup file
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1404

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1344-62-0x0000000002740000-0x0000000002743000-memory.dmp

      Filesize

      12KB

    • memory/1404-57-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/1404-58-0x0000000000401840-mapping.dmp

    • memory/1404-61-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/1404-64-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/1500-55-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1500-54-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1500-56-0x0000000075D71000-0x0000000075D73000-memory.dmp

      Filesize

      8KB

    • memory/1500-60-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB