Analysis
-
max time kernel
13s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
19-07-2021 13:06
Static task
static1
Behavioral task
behavioral1
Sample
296968fa478ce8b4832446c33afc37a5.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
296968fa478ce8b4832446c33afc37a5.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
296968fa478ce8b4832446c33afc37a5.exe
-
Size
54KB
-
MD5
296968fa478ce8b4832446c33afc37a5
-
SHA1
b8331521ad1beb8814c5b50d9e16430440bb2947
-
SHA256
d7854719c33f72a1afa0c562bdf44a8941b4017fbe90a215636aad91d1bf4f10
-
SHA512
e0eb126fae4a10f8bde0e684429a77739676c2a54ac9db313376e8e4335bc157523dc4b2781fd663cbf03ca92572308ab1a5e949d443a18d14da579bf9cc3e4d
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3532 2116 296968fa478ce8b4832446c33afc37a5.exe 77 PID 2116 wrote to memory of 3532 2116 296968fa478ce8b4832446c33afc37a5.exe 77 PID 2116 wrote to memory of 3532 2116 296968fa478ce8b4832446c33afc37a5.exe 77 PID 2116 wrote to memory of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80 PID 2116 wrote to memory of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80 PID 2116 wrote to memory of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80 PID 2116 wrote to memory of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80 PID 2116 wrote to memory of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80 PID 2116 wrote to memory of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80 PID 2116 wrote to memory of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80 PID 2116 wrote to memory of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80 PID 2116 wrote to memory of 3140 2116 296968fa478ce8b4832446c33afc37a5.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\296968fa478ce8b4832446c33afc37a5.exe"C:\Users\Admin\AppData\Local\Temp\296968fa478ce8b4832446c33afc37a5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\296968fa478ce8b4832446c33afc37a5.exeC:\Users\Admin\AppData\Local\Temp\296968fa478ce8b4832446c33afc37a5.exe2⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\296968fa478ce8b4832446c33afc37a5.exeC:\Users\Admin\AppData\Local\Temp\296968fa478ce8b4832446c33afc37a5.exe2⤵PID:3140
-