Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 02:03

General

  • Target

    e71687f19b2f1b17c4d27477060fa3bb424c77c1ed4163187dd7dbba691a04d8.exe

  • Size

    687KB

  • MD5

    5b2732fb77c0abf2fa6bc87523aa5e6d

  • SHA1

    283dac8642b724a4487503f4383908a28675a47a

  • SHA256

    e71687f19b2f1b17c4d27477060fa3bb424c77c1ed4163187dd7dbba691a04d8

  • SHA512

    d569bb2d132c4243ab5367eeee969cc7ad0f6ec88c75dfaad5d4e22e77b2828d6ed6e770519a2d1d2f083a3ae2ca1fc8bd9f256f389a2c759516abf52464e5a2

  • SSDEEP

    12288:Z6B778QIXQRXX8YrqDXSFcwBbvAgxQuk2Q/CxRk9u/eqcYCpYbatlMU:ABqgRnJYmc+jAgWukt/f8WqApYq

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e71687f19b2f1b17c4d27477060fa3bb424c77c1ed4163187dd7dbba691a04d8.exe
    "C:\Users\Admin\AppData\Local\Temp\e71687f19b2f1b17c4d27477060fa3bb424c77c1ed4163187dd7dbba691a04d8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Local\Temp\e71687f19b2f1b17c4d27477060fa3bb424c77c1ed4163187dd7dbba691a04d8.exe
      "C:\Users\Admin\AppData\Local\Temp\e71687f19b2f1b17c4d27477060fa3bb424c77c1ed4163187dd7dbba691a04d8.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 36
        3⤵
        • Program crash
        PID:2616

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/912-6-0x0000000004C30000-0x0000000004CBA000-memory.dmp

          Filesize

          552KB

        • memory/912-0-0x00000000012E0000-0x0000000001392000-memory.dmp

          Filesize

          712KB

        • memory/912-2-0x0000000000C30000-0x0000000000C70000-memory.dmp

          Filesize

          256KB

        • memory/912-3-0x0000000000380000-0x0000000000398000-memory.dmp

          Filesize

          96KB

        • memory/912-4-0x00000000003A0000-0x00000000003AE000-memory.dmp

          Filesize

          56KB

        • memory/912-5-0x00000000003F0000-0x0000000000406000-memory.dmp

          Filesize

          88KB

        • memory/912-1-0x00000000746C0000-0x0000000074DAE000-memory.dmp

          Filesize

          6.9MB

        • memory/912-15-0x00000000746C0000-0x0000000074DAE000-memory.dmp

          Filesize

          6.9MB

        • memory/2640-9-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2640-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2640-8-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2640-14-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2640-13-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2640-16-0x0000000000900000-0x0000000000C03000-memory.dmp

          Filesize

          3.0MB

        • memory/2640-17-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB