Analysis

  • max time kernel
    7s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 15:32

General

  • Target

    23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe

  • Size

    79KB

  • MD5

    ea777161ae80d3b7ca578f99efa072da

  • SHA1

    d2d9bac19ac17bbdd5cf0ddf9d17e938faf18b8c

  • SHA256

    23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c

  • SHA512

    aa9e18f47210f91645f05702eb1e6687113c283c8c9a3b525bd3978e8187b476cf58b0243d3676703485a46499541ca8b90d0229fd9f9aa351876ee611b2bec2

  • SSDEEP

    1536:8/wfW5aZlV930fJQFPQ/Vfi/mtbaz77777g7774o/8vLZzJ77a:aw5Nt0BzCmtuz77777g777bE5J77a

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe
    "C:\Users\Admin\AppData\Local\Temp\23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Users\Admin\AppData\Local\Temp\23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe
      "C:\Users\Admin\AppData\Local\Temp\23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe"
      2⤵
        PID:1672

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/240-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

      Filesize

      8KB

    • memory/1672-55-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/1672-56-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/1672-58-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/1672-60-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB