Analysis

  • max time kernel
    178s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 17:37

General

  • Target

    fa2766eb2ee6c1d9b1de336ca9fcb9ae50617a3a0f0ede1fba7673694af1968e.exe

  • Size

    228KB

  • MD5

    3eb3001e8d185ed7b61bb3238a8b344e

  • SHA1

    f21903c152b839881d80cd7c8470a3e9bc1614c2

  • SHA256

    fa2766eb2ee6c1d9b1de336ca9fcb9ae50617a3a0f0ede1fba7673694af1968e

  • SHA512

    54287bd0fd8a49a4f7d6fb939d4fc7c362152101a4229c72efd61c80047fbd85bfd0822fcc8928774a2d3dc726c87b630e5223b5f459d384737bff926f052d4e

  • SSDEEP

    6144:V5DK4NmIQpYcVX9jmzibNxGY70a0HwOFEQ3t:jDU/VeixGVbHC6t

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa2766eb2ee6c1d9b1de336ca9fcb9ae50617a3a0f0ede1fba7673694af1968e.exe
    "C:\Users\Admin\AppData\Local\Temp\fa2766eb2ee6c1d9b1de336ca9fcb9ae50617a3a0f0ede1fba7673694af1968e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\fa2766eb2ee6c1d9b1de336ca9fcb9ae50617a3a0f0ede1fba7673694af1968e.exe
      C:\Users\Admin\AppData\Local\Temp\fa2766eb2ee6c1d9b1de336ca9fcb9ae50617a3a0f0ede1fba7673694af1968e.exe
      2⤵
        PID:916

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/916-135-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/916-137-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB