Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 12:13

General

  • Target

    3cd3aa1a614792a9bc3b914eee34760a.exe

  • Size

    626KB

  • MD5

    3cd3aa1a614792a9bc3b914eee34760a

  • SHA1

    6e4c4f97c3bdfd87fde7b3d63a30ca0ebb231cc6

  • SHA256

    6377b70e1ea5e7a40ced3fc8bb99814cbdcddfbb8fe98e3692a39ed62c0296da

  • SHA512

    6efc5ceaad84e85545791998bef435ffcc99c49ed7a0986b1d5607f4046e17a3abb95a592a4f732c8783a290d18fdddac57a6ae41610ef62492fce46db9d7b19

  • SSDEEP

    12288:TeA+TpDWF0TjqSTKXk49SCjUliBqKvIwqWrw1hDRCGv/6/C9Y:TFi5E0T7KXt93jUwBpwdKw1lrvC/CY

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cd3aa1a614792a9bc3b914eee34760a.exe
    "C:\Users\Admin\AppData\Local\Temp\3cd3aa1a614792a9bc3b914eee34760a.exe"
    1⤵
      PID:2520
    • C:\Users\Admin\AppData\Local\Temp\3cd3aa1a614792a9bc3b914eee34760a.exe
      "C:\Users\Admin\AppData\Local\Temp\3cd3aa1a614792a9bc3b914eee34760a.exe"
      1⤵
        PID:1940
      • C:\Users\Admin\AppData\Local\Temp\3cd3aa1a614792a9bc3b914eee34760a.exe
        "C:\Users\Admin\AppData\Local\Temp\3cd3aa1a614792a9bc3b914eee34760a.exe"
        1⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2236

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1940-3-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/1940-2-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/1940-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2236-11-0x0000000013140000-0x00000000131E4000-memory.dmp

        Filesize

        656KB

      • memory/2520-9-0x0000000000400000-0x000000000051E000-memory.dmp

        Filesize

        1.1MB

      • memory/2520-7-0x0000000000400000-0x000000000051E000-memory.dmp

        Filesize

        1.1MB