Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe
Resource
win10v2004-20220812-en
General
-
Target
c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe
-
Size
60KB
-
MD5
5e543319eacd09163856e073672d060f
-
SHA1
6e12d4bf8db78060ad42e2aef2213efe958e0945
-
SHA256
c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3
-
SHA512
230a0980ee7ca41b8d3efc9199c4f7e6604921bafe540ca9479a1518621d63aea0b55486c1355cc7c829f2222554a5bb8ea97561b6eac32c34889eb59b9f942a
-
SSDEEP
768:LDhjgdzKPkd54IB0Bz6gti2GHchdPYClGro8Cd4jWFcDSYW4hoUDkYXCtOtdqicu:vhjyGBz6OGTCYr+Fc2Y7hoU8twdqiO
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ot2tj5y75t.exe c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ot2tj5y75t.exe c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1948 set thread context of 1912 1948 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1912 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1912 1948 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 28 PID 1948 wrote to memory of 1912 1948 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 28 PID 1948 wrote to memory of 1912 1948 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 28 PID 1948 wrote to memory of 1912 1948 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 28 PID 1948 wrote to memory of 1912 1948 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 28 PID 1948 wrote to memory of 1912 1948 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 28 PID 1912 wrote to memory of 1284 1912 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 16 PID 1912 wrote to memory of 1284 1912 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 16 PID 1912 wrote to memory of 1284 1912 c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe"C:\Users\Admin\AppData\Local\Temp\c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe"C:\Users\Admin\AppData\Local\Temp\c46815c7f40344b5a256c00dc9cd3824827b6f297ab407c817fbdd1fcd42a9f3.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1912
-
-