Analysis

  • max time kernel
    361s
  • max time network
    362s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 16:53

General

  • Target

    09f27e01898779236a9f31185667b9f4a97dd1f30c972386fd995502acfb992e.exe

  • Size

    233KB

  • MD5

    5bc13179adf4c341be9717bef93ebe50

  • SHA1

    7eb8902c5f090c39812d48b2e50e1eb1aef88173

  • SHA256

    09f27e01898779236a9f31185667b9f4a97dd1f30c972386fd995502acfb992e

  • SHA512

    af545babbcc73c5cd993c3a53921aa482c7068af029b2de38c4ffb7828ff0942676d7502579f721c8c52cd8f66bb26eb225b49de6c3a5c0ad221cf2e3a50e498

  • SSDEEP

    6144:POsIgB2ASQSFOqE0Wqaemzj+99nEmy3Kf6rTwk:PCgB9SULgv6j+fnE0fs

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09f27e01898779236a9f31185667b9f4a97dd1f30c972386fd995502acfb992e.exe
    "C:\Users\Admin\AppData\Local\Temp\09f27e01898779236a9f31185667b9f4a97dd1f30c972386fd995502acfb992e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\09f27e01898779236a9f31185667b9f4a97dd1f30c972386fd995502acfb992e.exe
      "C:\Users\Admin\AppData\Local\Temp\09f27e01898779236a9f31185667b9f4a97dd1f30c972386fd995502acfb992e.exe"
      2⤵
        PID:1736

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1736-0-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1736-2-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1736-4-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1736-5-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1736-6-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1736-8-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1736-10-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1736-11-0x0000000000440000-0x0000000000441000-memory.dmp
      Filesize

      4KB

    • memory/1736-13-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1736-15-0x0000000000440000-0x0000000000441000-memory.dmp
      Filesize

      4KB

    • memory/1736-17-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1736-19-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB