Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe
Resource
win10v2004-20220812-en
General
-
Target
662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe
-
Size
79KB
-
MD5
623d4d92f5ed77456b15bcb93cd8e37c
-
SHA1
d45b6555a1e80f4a3fe448c55e10806156750efb
-
SHA256
662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3
-
SHA512
25ea1dcfd08f1c0d70a852ec97ee7210ac616dfa5d688f0c263ef596ad442e236b0c63fac59f39fe202fe1ac4f17c2739733e2d81a0748bd906cd671abcbbd4b
-
SSDEEP
1536:Y85tK2bdXJ0qO/cRApm1kTYXEb8uyPG29zHW7u+y1s:vy2bZJ05/+ApLs0bOPG2VHW7u1y
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1112 set thread context of 688 1112 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 688 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 688 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1112 wrote to memory of 688 1112 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 28 PID 1112 wrote to memory of 688 1112 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 28 PID 1112 wrote to memory of 688 1112 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 28 PID 1112 wrote to memory of 688 1112 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 28 PID 1112 wrote to memory of 688 1112 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 28 PID 1112 wrote to memory of 688 1112 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 28 PID 688 wrote to memory of 1272 688 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 9 PID 688 wrote to memory of 1272 688 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 9 PID 688 wrote to memory of 1272 688 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 9 PID 688 wrote to memory of 1272 688 662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe"C:\Users\Admin\AppData\Local\Temp\662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe"C:\Users\Admin\AppData\Local\Temp\662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe" "aØéers\Admin\AppData\Local\Temp\662b93602d7d7ba8242c9124549f27850e4e84dfd3cbe7be383a5b93073533f3.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:688
-
-