Analysis

  • max time kernel
    112s
  • max time network
    121s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/10/2023, 00:29

General

  • Target

    82e14c458e458d1725e4615aa7d7996fc60b5cfa91693e718ee29fb2a9c94023.exe

  • Size

    1.1MB

  • MD5

    7d70f417d67151fd282d9850e9d6c059

  • SHA1

    2bb337f23c6dbf7020dbc3eef6890d950ee67c7c

  • SHA256

    82e14c458e458d1725e4615aa7d7996fc60b5cfa91693e718ee29fb2a9c94023

  • SHA512

    88f91f76537a4ab9d7a4dcdf085a94fc7d5a24632e3328760d4d9c9dbb144d32688bd2948b2b1534c7cfce329139dff8f0b9b6d7ce502b6fa9ed4dc556d92e7d

  • SSDEEP

    12288:7qjGzPenhUux5KYO1p8eLCriHVyimPXVU94YX6rurJXZ0ZCmq5EB9Jq:mjGzPenhUux5Kj8eP1yimt0+DI2XJ

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82e14c458e458d1725e4615aa7d7996fc60b5cfa91693e718ee29fb2a9c94023.exe
    "C:\Users\Admin\AppData\Local\Temp\82e14c458e458d1725e4615aa7d7996fc60b5cfa91693e718ee29fb2a9c94023.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:656
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:2904

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2904-0-0x0000000000400000-0x0000000000432000-memory.dmp

              Filesize

              200KB

            • memory/2904-4-0x0000000000400000-0x0000000000432000-memory.dmp

              Filesize

              200KB

            • memory/2904-3-0x0000000000400000-0x0000000000432000-memory.dmp

              Filesize

              200KB

            • memory/2904-5-0x0000000000400000-0x0000000000432000-memory.dmp

              Filesize

              200KB

            • memory/2904-6-0x0000000000400000-0x0000000000432000-memory.dmp

              Filesize

              200KB