Analysis
-
max time kernel
39s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe
Resource
win10v2004-20220812-en
General
-
Target
5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe
-
Size
300KB
-
MD5
635628b76f6c13e48140f9e7ba30bc9d
-
SHA1
cef3438d9d0f19a18eaba114a039cb02f81424d1
-
SHA256
5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c
-
SHA512
dd20db918a5151ef8c5589ad64a946f0e2684116f2e31752cc427f45ee1f39a73ed2751b0cf154e9bf98b360280311fad88bb73926e5d676cb49659dd9c55935
-
SSDEEP
6144:Z2G24eHcnAR+fZNnwkJhkB3Hu46xE2mmQHqKv/G4UO0O2kw:IGfe9R+fEkPktO4gE2mBqk30dkw
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1112 set thread context of 1724 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.eXe 1724 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.eXe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1724 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe 28 PID 1112 wrote to memory of 1724 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe 28 PID 1112 wrote to memory of 1724 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe 28 PID 1112 wrote to memory of 1724 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe 28 PID 1112 wrote to memory of 1724 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe 28 PID 1112 wrote to memory of 1724 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe 28 PID 1112 wrote to memory of 1724 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe 28 PID 1112 wrote to memory of 1724 1112 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe 28 PID 1724 wrote to memory of 1276 1724 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.eXe 16 PID 1724 wrote to memory of 1276 1724 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.eXe 16 PID 1724 wrote to memory of 1276 1724 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.eXe 16 PID 1724 wrote to memory of 1276 1724 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.eXe 16 PID 1724 wrote to memory of 1276 1724 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.eXe 16 PID 1724 wrote to memory of 1276 1724 5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.eXe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe"C:\Users\Admin\AppData\Local\Temp\5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\5fffd754fd0e30e417e860ed9d3eb80221fad19cdb92f07ffd7c42621dc5063c.eXe
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276