Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 15:30

General

  • Target

    ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe

  • Size

    93KB

  • MD5

    7a5fb254668e7a83334beb350c251200

  • SHA1

    4b5ffe16043c558dd91bb8b022e4ea6fbe113b2c

  • SHA256

    ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15

  • SHA512

    690a8f59a414dd2abe95a7070f2c6f9415cada5721c3426921475ba5dfd4a2cb45e5834ecf46fc4a9b734e5ffd3d6054983aea2462bd9a8187463aae06a67a67

  • SSDEEP

    1536:qO4SEoZ0uQdTc7OqErar+F++++++++++++++++++++8xSbazkPO+SQptzKvAd4:q9boZ0uqiOqErarw+++++++++++++++q

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe
        "C:\Users\Admin\AppData\Local\Temp\ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Users\Admin\AppData\Local\Temp\ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe
          "C:\Users\Admin\AppData\Local\Temp\ad067522def827a3f4fca30c31e16d3b4709627b6f2df5d46ebbbbedcc2c6f15.exe"
          3⤵
          • Drops startup file
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1420

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1208-62-0x0000000002490000-0x0000000002493000-memory.dmp

      Filesize

      12KB

    • memory/1324-54-0x00000000752B1000-0x00000000752B3000-memory.dmp

      Filesize

      8KB

    • memory/1324-56-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1324-55-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1324-60-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1420-57-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/1420-61-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/1420-64-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB