Analysis
-
max time kernel
5s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 23:59
Static task
static1
Behavioral task
behavioral1
Sample
e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe
Resource
win7-20220812-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe
-
Size
134KB
-
MD5
0c949933a2e9af9593314215e3d4b399
-
SHA1
49d2ffb2113f7bf628b4feba26fdc95ce15e273d
-
SHA256
e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802
-
SHA512
35741e4ab98625634176aadb19b932c2c4a2235290765cad524c803dfaf5ee876978dadac5ffd540c3e4d7e6d1fc3adeae0663a8614a751e03c7e79971c0dceb
-
SSDEEP
3072:Xyh7+Xeo46jZz076KWQyWCGLm8+ndws6:XGC9jN076KgWCG6LE
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 556 set thread context of 5076 556 e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe 79 PID 556 set thread context of 5076 556 e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe 79 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 556 e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 556 wrote to memory of 5076 556 e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe 79 PID 556 wrote to memory of 5076 556 e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe 79 PID 556 wrote to memory of 5076 556 e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe"C:\Users\Admin\AppData\Local\Temp\e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe"C:\Users\Admin\AppData\Local\Temp\e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe"2⤵
- Enumerates system info in registry
PID:5076
-