Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 23:28

General

  • Target

    19927a9643799801586613379d239298.exe

  • Size

    84KB

  • MD5

    19927a9643799801586613379d239298

  • SHA1

    f88bf156a05f574bd2e8fb7b94466ddf0c7fc594

  • SHA256

    bdca7275c2df84194e7be64aa78983e511c019a9c3f54b9a2ae27b3cff00a161

  • SHA512

    336e9cc0d44568eaf6de9040fcb22b4a602f8909648144817cf9703d50a656d51647e1c9117a7021df9030ab6535777003e382f90495ad327f29c801146dd7c9

  • SSDEEP

    1536:txj2iAb0mg5Tf9u8vVjYCgz/DJHdTNRpJ66tSlBXi:/j2iAbxgZfYWtutHdhRj664Hy

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3512
      • C:\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe
        "C:\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4456
        • C:\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe
          "C:\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe" :\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3020

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3020-1-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3020-3-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/3020-8-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3020-9-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/3512-4-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3512-5-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB

    • memory/4456-0-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/4456-2-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB