Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 20:37

General

  • Target

    370139e97a850e244f482e4cceb8f04b99fc029829094703357e0d9512324d01.exe

  • Size

    72KB

  • MD5

    15eceac6f09bcc8458c7c0916c902252

  • SHA1

    9b9d78b2f5b9dc8eae2aa42cf210d9a07b8bbdca

  • SHA256

    370139e97a850e244f482e4cceb8f04b99fc029829094703357e0d9512324d01

  • SHA512

    d053d27c5b23b365c26707bb5b32efd6958e996cf942e277ac81c1ca05823ead31ac6856a8c2dfdec422a4b5f043425c25aebb2e16a98d8c651d1f9f94c445f3

  • SSDEEP

    1536:7j59JJ085QyxiytS/Ry04icyJUY0vQSF2G:nrfxray04ictY0HF

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\370139e97a850e244f482e4cceb8f04b99fc029829094703357e0d9512324d01.exe
        "C:\Users\Admin\AppData\Local\Temp\370139e97a850e244f482e4cceb8f04b99fc029829094703357e0d9512324d01.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4220
        • C:\Users\Admin\AppData\Local\Temp\370139e97a850e244f482e4cceb8f04b99fc029829094703357e0d9512324d01.exe
          "C:\Users\Admin\AppData\Local\Temp\370139e97a850e244f482e4cceb8f04b99fc029829094703357e0d9512324d01.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1968

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1968-133-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/1968-135-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/1968-136-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB