Analysis
-
max time kernel
31s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe
Resource
win10v2004-20220812-en
General
-
Target
90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe
-
Size
294KB
-
MD5
054074d6cdce0dc4750b7f2ba51a1a53
-
SHA1
ea02823b82f50d48af756a9a01693203a6a650c5
-
SHA256
90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2
-
SHA512
598db85399669bef6c932179bbf84f8bbeb1f8623ca6c72a9f7e040b9df5eb7110fa3e2c570d3fc5258867ab29440b60983b9e831d1d209317903a54782e1728
-
SSDEEP
6144:WYHH/YRHIlw6DH/bAAbAhhBzdi5gxFpxOi1YDA+Q6yCwBH7CCccQ50e:zHfYRovD/brAhkSPd+/y97C1cq0e
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1792 set thread context of 1676 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1676 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 1676 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1676 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 28 PID 1792 wrote to memory of 1676 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 28 PID 1792 wrote to memory of 1676 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 28 PID 1792 wrote to memory of 1676 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 28 PID 1792 wrote to memory of 1676 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 28 PID 1792 wrote to memory of 1676 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 28 PID 1792 wrote to memory of 1676 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 28 PID 1792 wrote to memory of 1676 1792 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 28 PID 1676 wrote to memory of 1236 1676 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 17 PID 1676 wrote to memory of 1236 1676 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 17 PID 1676 wrote to memory of 1236 1676 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 17 PID 1676 wrote to memory of 1236 1676 90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe"C:\Users\Admin\AppData\Local\Temp\90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe"C:\Users\Admin\AppData\Local\Temp\90171b2ab759912520e689bdc8d69a889ae7be99d0f87723d54abaf6582d17f2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236