Analysis

  • max time kernel
    239s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 16:48

General

  • Target

    9899f023748ad7976f2062dd8325be1533a874cbaf39230f5f795771bc01df03.exe

  • Size

    44KB

  • MD5

    05c3d370972936cf46b0015376ed1f90

  • SHA1

    f86e141785a3e0c077ccfee6694a26150c7859b7

  • SHA256

    9899f023748ad7976f2062dd8325be1533a874cbaf39230f5f795771bc01df03

  • SHA512

    4a280728bdaf759ea69f72a4e445ef73f5b05f6daf82cdd8c1d9796090d5227b886e089e3653d698343a0e83d9692d9aa47a444a87dba4005b97ab650e5e4f65

  • SSDEEP

    768:IjD4lTtzK2SNgRQObhPkpn2DP68YAfvGCOLW0y0lKAdX:IjD4lhz1PRQEkgDP6+R7zQKAdX

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9899f023748ad7976f2062dd8325be1533a874cbaf39230f5f795771bc01df03.exe
    "C:\Users\Admin\AppData\Local\Temp\9899f023748ad7976f2062dd8325be1533a874cbaf39230f5f795771bc01df03.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Users\Admin\AppData\Local\Temp\9899f023748ad7976f2062dd8325be1533a874cbaf39230f5f795771bc01df03.exe
      a|
      2⤵
      • Maps connected drives based on registry
      • Suspicious use of SetWindowsHookEx
      PID:268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/268-56-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/268-59-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/268-63-0x0000000075671000-0x0000000075673000-memory.dmp

    Filesize

    8KB

  • memory/268-64-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB