Analysis

  • max time kernel
    154s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 13:11

General

  • Target

    e480352758da4ff3eba0f6f06bc314e1edfbb93c6d8d871aa4f4ea866d4acb69.exe

  • Size

    78KB

  • MD5

    badd13be68da2477fca3e204f3015320

  • SHA1

    19c213f48cdc1029a64058aca27177a9b5590ed3

  • SHA256

    e480352758da4ff3eba0f6f06bc314e1edfbb93c6d8d871aa4f4ea866d4acb69

  • SHA512

    d06d1785cb547465f489137f239a98ff53737475ec1dda23019787fdeb4ba3e043f55b0576426bd5d8a84779e047a9adc4c44c75c2e4e17b420779b799018bfb

  • SSDEEP

    768:iJ37N9NNmYle5FhAJYVndC70YRVdYQXJXUcVZpT/fpXGhMhj2N9Tgy9bwe8:yLbNNOMtVpycVvfC/TNN8

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e480352758da4ff3eba0f6f06bc314e1edfbb93c6d8d871aa4f4ea866d4acb69.exe
    "C:\Users\Admin\AppData\Local\Temp\e480352758da4ff3eba0f6f06bc314e1edfbb93c6d8d871aa4f4ea866d4acb69.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Users\Admin\AppData\Local\Temp\e480352758da4ff3eba0f6f06bc314e1edfbb93c6d8d871aa4f4ea866d4acb69.exe
      C:\Users\Admin\AppData\Local\Temp\e480352758da4ff3eba0f6f06bc314e1edfbb93c6d8d871aa4f4ea866d4acb69.exe
      2⤵
        PID:3208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 460
          3⤵
          • Program crash
          PID:3056
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3208 -ip 3208
      1⤵
        PID:4724

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3208-135-0x0000000000400000-0x0000000000403000-memory.dmp

        Filesize

        12KB

      • memory/3208-137-0x0000000000400000-0x0000000000402800-memory.dmp

        Filesize

        10KB