Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 10:56

General

  • Target

    2500aade194155f8886f2e4d39677643b1cf083327bfde07f47e643e928a0044.exe

  • Size

    188KB

  • MD5

    d556529dad94d88f7c0d1fd953f2a0bc

  • SHA1

    f929de307807be52dbb0d3c6712c52016ba0ee42

  • SHA256

    2500aade194155f8886f2e4d39677643b1cf083327bfde07f47e643e928a0044

  • SHA512

    3adcebcbf0d256fa02ffc112f4e0e892123ade97632e728549c4d0743b074a90f9e20d0934092c81630e7c41ebd0e0d15cff4191638167957d4f21dd68a06182

  • SSDEEP

    3072:rmEISQHkpQmVsdTDhIn48zJENDCzEnhXiu34zsRqBv30Y7n7LZaHaVk+zHTK:r+BEpElkZzJEtEEnhXp2suEY77L7Vk+n

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2500aade194155f8886f2e4d39677643b1cf083327bfde07f47e643e928a0044.exe
    "C:\Users\Admin\AppData\Local\Temp\2500aade194155f8886f2e4d39677643b1cf083327bfde07f47e643e928a0044.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\AppData\Local\Temp\2500aade194155f8886f2e4d39677643b1cf083327bfde07f47e643e928a0044.exe
      -d -t -l -e0.0.0.0 -i127.0.0.1 -p2103 -a
      2⤵
        PID:4944

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4944-135-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/4944-136-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/4944-137-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/4944-138-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB