Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 17:54

General

  • Target

    09c5572a4d5eac974a1ca5e21a72294b.exe

  • Size

    27KB

  • MD5

    09c5572a4d5eac974a1ca5e21a72294b

  • SHA1

    d6a1015e8243e8cefa7fee1fcda771cb1ff3d96d

  • SHA256

    ff2c12f20f6cf7de894b215124226bf0e9196af577d4ac371196ed25f46e988a

  • SHA512

    1cc6f68b7389b385c68a14b7825d7d5431e9acfb02b14ecc9521c8428270f75241a02b33f7c7f08ac5e1568324050c03b31f3bd3f89f71c3a1ef197621fd9675

  • SSDEEP

    384:3n/VsAp+qD3ikQ9OavrQcsqCj0Shw2NQVm2fwH3IrE4vQzmeixNkVdfx:3tVD31Q9OavrXsF0yWk4Q4ozJijWfx

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09c5572a4d5eac974a1ca5e21a72294b.exe
    "C:\Users\Admin\AppData\Local\Temp\09c5572a4d5eac974a1ca5e21a72294b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Users\Admin\AppData\Local\Temp\09c5572a4d5eac974a1ca5e21a72294b.exe
      C:\Users\Admin\AppData\Local\Temp\09c5572a4d5eac974a1ca5e21a72294b.exe
      2⤵
        PID:3304

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3304-5-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/3304-4-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/3304-2-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/3304-6-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB