Analysis

  • max time kernel
    122s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 03:42

General

  • Target

    aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe

  • Size

    929KB

  • MD5

    967bae478b6f71fa77af48c2cd440fd1

  • SHA1

    dcc8f4f9bbe28d4dc092f4d75f1e290aec782305

  • SHA256

    aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880

  • SHA512

    f7d82075423c173c11574d862eac5ff15d0e9cb2974ce3c32290244e4b057205f07f736daa84a8bfd4ddc9540963c2e42b98696d6bdd62b604b03243bc96a0b1

  • SSDEEP

    12288:qJ//yfYb5BIQZVtyHnvGZIPLBY2LlG+eaqGb7hV9lnG8fs3K9Q2UOiPT6Kt/F9:uiuBtZcGZIPLphG+eH2b9c8E3Qi7D

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe
    "C:\Users\Admin\AppData\Local\Temp\aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:3060
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 200
          3⤵
          • Program crash
          PID:3036

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1428-0-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/1428-1-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/1428-2-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/1428-3-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/1428-5-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/1428-6-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1428-7-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/1428-4-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/1428-9-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/1428-11-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB