Analysis

  • max time kernel
    11s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 20:41

General

  • Target

    qeUaxJCA3FO.exe

  • Size

    598KB

  • MD5

    47c2be5511f85eea87d60087a2295101

  • SHA1

    688a4b4e3bc01bee9e77d8520cf45743573f46a4

  • SHA256

    b2f49f0484068d893545562b47fdb527299dce02c70fe7c99c1aec82310c9953

  • SHA512

    bbe2b4706a3431bb373d88e0548fa92e72b2cbbde86fc0c3f2523fe2492ac3f4b9697c1f8bad27e32595181a4fa7cb381bbe11e9a456903c725870cfaf1fa65c

  • SSDEEP

    12288:25oKL1f7G8fKjtqlWtICj+mkcrnRdhoTkTRqMZAC93sdEO:2VLv8qlYfkMPZX9kt

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qeUaxJCA3FO.exe
    "C:\Users\Admin\AppData\Local\Temp\qeUaxJCA3FO.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4308
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1300,i,17325488789339133686,9539570259395798500,262144 --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:8
      1⤵
        PID:100

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1556-0-0x0000000000560000-0x0000000000561000-memory.dmp

        Filesize

        4KB

      • memory/4308-1-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/4308-3-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/4308-4-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/4308-5-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB