Analysis
-
max time kernel
22s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe
-
Size
109KB
-
MD5
0897610d070501c0e7caf7b0fab99cde
-
SHA1
d3439dc50798e8d3a1fba83e282ab0b3ae3e0ecc
-
SHA256
617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310
-
SHA512
056cb847abb58dd26f033f1427c859503aabae628a0b6a6e1e3e99bb91f6b9cc897cc7108f2bced3ec3538e670a91bd39822f8647c8c2dea9cd7dbfff73278a2
-
SSDEEP
3072:uvbBxHn/XQmuHDoTE49sL1VpqwgjIbTZiy:uvXn4mYsE49CpbTD
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1072 set thread context of 1168 1072 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1168 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1168 1072 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 27 PID 1072 wrote to memory of 1168 1072 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 27 PID 1072 wrote to memory of 1168 1072 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 27 PID 1072 wrote to memory of 1168 1072 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 27 PID 1072 wrote to memory of 1168 1072 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 27 PID 1072 wrote to memory of 1168 1072 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 27 PID 1168 wrote to memory of 1392 1168 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 11 PID 1168 wrote to memory of 1392 1168 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 11 PID 1168 wrote to memory of 1392 1168 617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe 11
Processes
-
C:\Users\Admin\AppData\Local\Temp\617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe"C:\Users\Admin\AppData\Local\Temp\617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe"C:\Users\Admin\AppData\Local\Temp\617d2ee46c05845052d78f7a73420cc126a23dc9cdc1b95f86c169c93f684310.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392