Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 05:02

General

  • Target

    988ae212d0de144f395c9e91a40dac44.exe

  • Size

    44KB

  • MD5

    988ae212d0de144f395c9e91a40dac44

  • SHA1

    d62549640876545ef92a0d14df15fff9fc6b2a03

  • SHA256

    8dd2020765bc66d92c11a1f316abc21dc72d8b323cd66f9e96dec64584c35c49

  • SHA512

    b74de3d44b79e03008c149bf1342f8e2afe7fa8b3d9c97a352140b62aeecf39586f2b707a1069e47c5a5521fa12c9bb766d108de29551a4e924eb274bace2994

  • SSDEEP

    768:7zBg+U2oKQzuBbgkNJ0I0p2HJwLAoJfA2kIsfuk+k912rcf6jO9bM7s6l0:xfUlkyJmdIsfukFJfsO9bMo6l0

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\988ae212d0de144f395c9e91a40dac44.exe
        "C:\Users\Admin\AppData\Local\Temp\988ae212d0de144f395c9e91a40dac44.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Local\Temp\988ae212d0de144f395c9e91a40dac44.exe
          "C:\Users\Admin\AppData\Local\Temp\988ae212d0de144f395c9e91a40dac44.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2964

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1252-16-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1252-19-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/1972-11-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2964-0-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2964-2-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2964-4-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2964-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2964-13-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2964-14-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2964-15-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/2964-28-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/2964-30-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB