Analysis

  • max time kernel
    42s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 10:56

General

  • Target

    9e7523f339ae604b8279b54311500050b62982577caf97b347c2168360dd8c18.exe

  • Size

    206KB

  • MD5

    31605d10903ef1f6fb57ae4417e5fba6

  • SHA1

    8a0240c20998ce8b064b20e55de21a1f4b875e28

  • SHA256

    9e7523f339ae604b8279b54311500050b62982577caf97b347c2168360dd8c18

  • SHA512

    e9eb83699340353256b982321dd9adcfeaebe92ca79512e95b313fed55308717321aed04362657754bb13407cb1dbf3947aaf6e2a24a29cfdc4bfae179b92096

  • SSDEEP

    3072:oh1P00NzJY/AZuiHeG/EML04RFjhN1+DBtU7Z9FqaclGlaJ2GFLWLRAtFiYX4wdL:gM0TdLHeGEMnLNNQ1uCFKLRAtF4wCnM

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e7523f339ae604b8279b54311500050b62982577caf97b347c2168360dd8c18.exe
    "C:\Users\Admin\AppData\Local\Temp\9e7523f339ae604b8279b54311500050b62982577caf97b347c2168360dd8c18.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\9e7523f339ae604b8279b54311500050b62982577caf97b347c2168360dd8c18.exe
      "C:\Users\Admin\AppData\Local\Temp\9e7523f339ae604b8279b54311500050b62982577caf97b347c2168360dd8c18.exe"
      2⤵
        PID:1168

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1168-55-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1168-56-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1168-58-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1168-59-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1168-61-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1168-65-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1628-54-0x0000000075F01000-0x0000000075F03000-memory.dmp

      Filesize

      8KB