Analysis

  • max time kernel
    115s
  • max time network
    122s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-10-2023 16:40

General

  • Target

    d182cc504aa364a432a8f10c5a9e4f820a6dfe6996138c63524429c8f6848cdd.exe

  • Size

    1.1MB

  • MD5

    395b1078e2ea98b9da757393cbe6a5e3

  • SHA1

    3382556b1b6a5b615d3559a34d858baa06561e93

  • SHA256

    d182cc504aa364a432a8f10c5a9e4f820a6dfe6996138c63524429c8f6848cdd

  • SHA512

    287e873ea06040f3b367aa5890692ac4b96676e25d562d975376815a462f6a2c21edb331ce4c58809039192b9b4d0ec3c1534634ffbea38d6cd3296165b42547

  • SSDEEP

    12288:zPHiJmNwAmRmB+0YVsFgcZUBIonxCIog8/uvSbJqhrcgEmBFc9:amNwAmRmB+/VE1UBdgnerKe

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d182cc504aa364a432a8f10c5a9e4f820a6dfe6996138c63524429c8f6848cdd.exe
    "C:\Users\Admin\AppData\Local\Temp\d182cc504aa364a432a8f10c5a9e4f820a6dfe6996138c63524429c8f6848cdd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:5056
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:3676

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3676-0-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/3676-3-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/3676-5-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/3676-4-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/3676-6-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB