Analysis

  • max time kernel
    160s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 11:20

General

  • Target

    f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe

  • Size

    251KB

  • MD5

    42d28123a3342ec78b95a0ac2f44dc03

  • SHA1

    0208e3776ac4021fe3e36f5ee7a6519d61f20562

  • SHA256

    f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957

  • SHA512

    12891c893fa4018f33d4162049fcd8667db768194f665d67dc7c5530ce4cbc391f9e32f6cb4caf2550b1eed54517ec1e7e207555057b58099328468b1d7056d7

  • SSDEEP

    6144:45VAoJ+t3A/mahXi5fOMxd1QcypK9HuV8qzBWRpgUilbDbzR:4HAht3gm6y4MnSMYPzMRpgU4D

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe
    "C:\Users\Admin\AppData\Local\Temp\f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4348
    • \??\c:\users\admin\appdata\local\temp\f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe
      "c:\users\admin\appdata\local\temp\f22360d1224515fa43d7b9dd8b647995118dafff01e087c0b6a09506c37d9957.exe"
      2⤵
        PID:744

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/744-134-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/744-136-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB