Analysis

  • max time kernel
    189s
  • max time network
    213s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 08:03

General

  • Target

    f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94.exe

  • Size

    356KB

  • MD5

    22f2e0904bae1e4c047fa3d24ba9549f

  • SHA1

    7156b78f01ecb7ac752ba901b6a094f7f4004886

  • SHA256

    f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94

  • SHA512

    e2c172331ac37440db39a4f5ef70391642c6c765580f355442f4ea5a5d2c91f12afb714144ba0e5209122c0b4a9a7b535bb77bb8f9b2ac7d65f28513e58f155c

  • SSDEEP

    6144:rNEegWam3qTA8KL4SOVknLSulqgSQsJimTNjJmULUstF26mHFzAW12Ee2bOjOnWr:BEsF3qJKL4r34aUm35LUsDUzIb2rnWkM

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 11 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94.exe
    "C:\Users\Admin\AppData\Local\Temp\f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Users\Admin\AppData\Local\Temp\f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94.exe
      "C:\Users\Admin\AppData\Local\Temp\f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3468
      • C:\Windows\SysWOW64\.exe
        C:\Windows\system32\.exe 1120 "C:\Users\Admin\AppData\Local\Temp\f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3420
        • C:\Windows\SysWOW64\.exe
          "C:\Windows\SysWOW64\.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Windows\SysWOW64\.exe
            C:\Windows\system32\.exe 1148 "C:\Windows\SysWOW64\.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4416
            • C:\Windows\SysWOW64\.exe
              "C:\Windows\SysWOW64\.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:3116
              • C:\Windows\SysWOW64\.exe
                C:\Windows\system32\.exe 1092 "C:\Windows\SysWOW64\.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1184
                • C:\Windows\SysWOW64\.exe
                  "C:\Windows\SysWOW64\.exe"
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  PID:4200

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\.exe

          Filesize

          356KB

          MD5

          22f2e0904bae1e4c047fa3d24ba9549f

          SHA1

          7156b78f01ecb7ac752ba901b6a094f7f4004886

          SHA256

          f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94

          SHA512

          e2c172331ac37440db39a4f5ef70391642c6c765580f355442f4ea5a5d2c91f12afb714144ba0e5209122c0b4a9a7b535bb77bb8f9b2ac7d65f28513e58f155c

        • C:\Windows\SysWOW64\.exe

          Filesize

          356KB

          MD5

          22f2e0904bae1e4c047fa3d24ba9549f

          SHA1

          7156b78f01ecb7ac752ba901b6a094f7f4004886

          SHA256

          f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94

          SHA512

          e2c172331ac37440db39a4f5ef70391642c6c765580f355442f4ea5a5d2c91f12afb714144ba0e5209122c0b4a9a7b535bb77bb8f9b2ac7d65f28513e58f155c

        • C:\Windows\SysWOW64\.exe

          Filesize

          356KB

          MD5

          22f2e0904bae1e4c047fa3d24ba9549f

          SHA1

          7156b78f01ecb7ac752ba901b6a094f7f4004886

          SHA256

          f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94

          SHA512

          e2c172331ac37440db39a4f5ef70391642c6c765580f355442f4ea5a5d2c91f12afb714144ba0e5209122c0b4a9a7b535bb77bb8f9b2ac7d65f28513e58f155c

        • C:\Windows\SysWOW64\.exe

          Filesize

          356KB

          MD5

          22f2e0904bae1e4c047fa3d24ba9549f

          SHA1

          7156b78f01ecb7ac752ba901b6a094f7f4004886

          SHA256

          f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94

          SHA512

          e2c172331ac37440db39a4f5ef70391642c6c765580f355442f4ea5a5d2c91f12afb714144ba0e5209122c0b4a9a7b535bb77bb8f9b2ac7d65f28513e58f155c

        • C:\Windows\SysWOW64\.exe

          Filesize

          356KB

          MD5

          22f2e0904bae1e4c047fa3d24ba9549f

          SHA1

          7156b78f01ecb7ac752ba901b6a094f7f4004886

          SHA256

          f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94

          SHA512

          e2c172331ac37440db39a4f5ef70391642c6c765580f355442f4ea5a5d2c91f12afb714144ba0e5209122c0b4a9a7b535bb77bb8f9b2ac7d65f28513e58f155c

        • C:\Windows\SysWOW64\.exe

          Filesize

          356KB

          MD5

          22f2e0904bae1e4c047fa3d24ba9549f

          SHA1

          7156b78f01ecb7ac752ba901b6a094f7f4004886

          SHA256

          f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94

          SHA512

          e2c172331ac37440db39a4f5ef70391642c6c765580f355442f4ea5a5d2c91f12afb714144ba0e5209122c0b4a9a7b535bb77bb8f9b2ac7d65f28513e58f155c

        • C:\Windows\SysWOW64\.exe

          Filesize

          356KB

          MD5

          22f2e0904bae1e4c047fa3d24ba9549f

          SHA1

          7156b78f01ecb7ac752ba901b6a094f7f4004886

          SHA256

          f1c226763ff66c2a5406c8f64c16a73b0adcb952164891a16f075c3f135b1a94

          SHA512

          e2c172331ac37440db39a4f5ef70391642c6c765580f355442f4ea5a5d2c91f12afb714144ba0e5209122c0b4a9a7b535bb77bb8f9b2ac7d65f28513e58f155c

        • memory/2504-156-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/2504-150-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/3116-162-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/3116-161-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/3468-139-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/3468-151-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/3468-138-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/3468-137-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/3468-135-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/4200-172-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/4200-173-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB