Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe
Resource
win10v2004-20220901-en
General
-
Target
22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe
-
Size
142KB
-
MD5
7a6dcc8d68a1df0f550969418334e870
-
SHA1
3b33ae01ca0b8113ae5e8c91a4b27747a1c0bf05
-
SHA256
22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70
-
SHA512
aeb3385e2001b386833b83494f20ac8043a584ff6799a56744311890877739cebf95f759311592c279ddda10803de6a0f4a859d92f3d90ba059e914ca7449edd
-
SSDEEP
3072:Ocrt0ccgNcPgNAbOKG/Upl1Nl/gQm0BQPC735PgRO/YqL:OcrWlGsgKblR3gB4QPo5I8Yq
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2020-59-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2020-57-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral1/memory/2020-60-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 532 set thread context of 2020 532 22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 532 wrote to memory of 2020 532 22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe 28 PID 532 wrote to memory of 2020 532 22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe 28 PID 532 wrote to memory of 2020 532 22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe 28 PID 532 wrote to memory of 2020 532 22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe 28 PID 532 wrote to memory of 2020 532 22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe 28 PID 532 wrote to memory of 2020 532 22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe 28 PID 532 wrote to memory of 2020 532 22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe 28 PID 532 wrote to memory of 2020 532 22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe"C:\Users\Admin\AppData\Local\Temp\22991e19d62d782926bded98fda4f4e1dc9338b7fea04a0b862ccafd66a97c70.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2020
-