Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe
Resource
win7-20220901-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe
Resource
win10v2004-20220901-en
1 signatures
150 seconds
General
-
Target
e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe
-
Size
86KB
-
MD5
91fbb1c9e66aed72ae81439360b99770
-
SHA1
945712a00da4d304e345b7353c0d6a4cd04293d0
-
SHA256
e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059
-
SHA512
889b65fda1fa02a1c84849b0cbf265ffaab787f9e51a78f4c5cbc907242fea0115298e8a0440913589d6c126559e440582ea09c37000f9ea2a44d54032585b41
-
SSDEEP
1536:iMP5xvb/GUPMWLpbQ/UTO7TkiU9OAA5JL3sF1:VvbeUrcclXM3DTsD
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oyt7yd7d.exe e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oyt7yd7d.exe e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 988 2032 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 988 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2032 wrote to memory of 988 2032 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 27 PID 2032 wrote to memory of 988 2032 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 27 PID 2032 wrote to memory of 988 2032 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 27 PID 2032 wrote to memory of 988 2032 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 27 PID 2032 wrote to memory of 988 2032 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 27 PID 2032 wrote to memory of 988 2032 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 27 PID 988 wrote to memory of 1368 988 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 15 PID 988 wrote to memory of 1368 988 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 15 PID 988 wrote to memory of 1368 988 e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe"C:\Users\Admin\AppData\Local\Temp\e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe"C:\Users\Admin\AppData\Local\Temp\e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:988
-
-