Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 17:08

General

  • Target

    c3e75e89bed539183a64517860cf7b18.exe

  • Size

    129KB

  • MD5

    c3e75e89bed539183a64517860cf7b18

  • SHA1

    e423dc43112c99f2ef2910b88c768c6540b23994

  • SHA256

    388a6597b917818d8ea61e58a8faee79e0df3ec841d694ff66833bac3d225c63

  • SHA512

    2054fe089bc23de2ffd8679f7b57e2141717af5af743dee4964f3e2aeebfd091034fc63cf07763051d09c7a322a203ffdd91a731d9fe4987a27c628981c01373

  • SSDEEP

    3072:ECqPrOlSM4ckJDTw0v+UpXSqCxShLijtk7sl3phkiwxBan:HqPrOlSpJ40rpmyiBphRs+

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3e75e89bed539183a64517860cf7b18.exe
    "C:\Users\Admin\AppData\Local\Temp\c3e75e89bed539183a64517860cf7b18.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Users\Admin\AppData\Local\Temp\c3e75e89bed539183a64517860cf7b18.exe
      C:\Users\Admin\AppData\Local\Temp\c3e75e89bed539183a64517860cf7b18.exe
      2⤵
      • Modifies WinLogon for persistence
      • Adds Run key to start application
      PID:4804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/644-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/644-3-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4804-1-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4804-4-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4804-5-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4804-6-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB