Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 00:08
Static task
static1
Behavioral task
behavioral1
Sample
573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe
Resource
win10v2004-20220721-en
General
-
Target
573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe
-
Size
73KB
-
MD5
5c67bfc12fc8c93bb98225966ad468d1
-
SHA1
cabcb7a591c7fbf9c5e90d84cefc16d1a94ac0eb
-
SHA256
573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711
-
SHA512
20cfb4b43779fc0ff2c1b9bc177f3c58ecbdf33c8225286b680eb65abe3a434123b2c435a23b43ebb4960cd0e1cff4359006041efc4129b69f8a05b6d3364bd5
Malware Config
Signatures
-
suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure
suricata: ET MALWARE Possible Kelihos.F EXE Download Common Structure
-
Processes:
resource yara_rule behavioral1/memory/1964-58-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1964-60-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1964-61-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1964-64-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1964-66-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1964-67-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1964-68-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1964-69-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exedescription pid process target process PID 308 set thread context of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exepid process 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 1964 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 1964 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 1964 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 1964 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 1964 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exepid process 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exedescription pid process target process PID 308 wrote to memory of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe PID 308 wrote to memory of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe PID 308 wrote to memory of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe PID 308 wrote to memory of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe PID 308 wrote to memory of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe PID 308 wrote to memory of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe PID 308 wrote to memory of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe PID 308 wrote to memory of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe PID 308 wrote to memory of 1964 308 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe 573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe"C:\Users\Admin\AppData\Local\Temp\573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Local\Temp\573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe"C:\Users\Admin\AppData\Local\Temp\573dc43b7ec06057f40006795c11c163b52837c63c08e1c0e27c41c9839e7711.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-