Analysis

  • max time kernel
    168s
  • max time network
    512s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 12:16

General

  • Target

    d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0.exe

  • Size

    52KB

  • MD5

    59086b04a14b1e8446ae366e2000efd9

  • SHA1

    bdb517f822b05fd896900dd73039657a57e752ae

  • SHA256

    d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0

  • SHA512

    f4ddea6c5c05f5643dc2d529d4dbc665c8f06bef64c71d908acf29fb3d8ae8e81550182369b818a053cabfe35d1d6cafc2af6b75b18eee29161152a577bf3d93

  • SSDEEP

    768:Rdv0uY8f2Bto2RLPrwfnC+ar/5s5KTDiI91:R9jYVtouLP0fML5scP91

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0.exe
    "C:\Users\Admin\AppData\Local\Temp\d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Users\Admin\AppData\Local\Temp\d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0.exe
      "C:\Users\Admin\AppData\Local\Temp\d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0.exe"
      2⤵
        PID:1652

    Network

    • flag-unknown
      DNS
      151.122.125.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      151.122.125.40.in-addr.arpa
      IN PTR
      Response
    • 88.221.25.154:80
      322 B
      7
    • 88.221.25.154:80
      322 B
      7
    • 104.80.225.205:443
      322 B
      7
    • 20.50.73.9:443
      322 B
      7
    • 8.248.7.254:80
      322 B
      7
    • 8.248.7.254:80
      322 B
      7
    • 8.248.7.254:80
      322 B
      7
    • 52.152.108.96:443
      260 B
      5
    • 8.248.7.254:80
      260 B
      5
    • 67.27.153.254:80
      260 B
      5
    • 8.238.20.126:80
      46 B
      40 B
      1
      1
    • 8.248.7.254:80
      46 B
      40 B
      1
      1
    • 127.0.0.1:81
      d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0.exe
    • 127.0.0.1:81
      d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0.exe
    • 127.0.0.1:81
      d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0.exe
    • 127.0.0.1:81
      d8d751d8d7fdd860e53ad509536c00abfb928225c5d81c998fa4e8ed2166d2f0.exe
    • 8.8.8.8:53
      151.122.125.40.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      151.122.125.40.in-addr.arpa

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1652-134-0x0000000000000000-mapping.dmp

    • memory/1652-135-0x0000000000400200-0x0000000000400400-memory.dmp

      Filesize

      512B

    • memory/1652-136-0x0000000000400000-0x0000000000401000-memory.dmp

      Filesize

      4KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.