Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 01:06
Static task
static1
Behavioral task
behavioral1
Sample
01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe
Resource
win10v2004-20220901-en
General
-
Target
01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe
-
Size
115KB
-
MD5
0a83529ecdb8385ab015e92769ac64e1
-
SHA1
67cbf759a595dcee90e92a90b2d7f2156b8e3c1a
-
SHA256
01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6
-
SHA512
a84106a62456cb00fcfd43606b230035998c0079f37faeda751edbfe4f8ad9784f81862f6768f89df83c3e086535bad84564d287d9fb5226531222809374b0f2
-
SSDEEP
3072:VCTaKooucBUJusoCH4aVju5yYtuIG8a1nG+X:ATaKoHc0oCYui5yYzGbxGS
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1284 set thread context of 2044 1284 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2044 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2044 1284 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 27 PID 1284 wrote to memory of 2044 1284 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 27 PID 1284 wrote to memory of 2044 1284 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 27 PID 1284 wrote to memory of 2044 1284 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 27 PID 1284 wrote to memory of 2044 1284 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 27 PID 1284 wrote to memory of 2044 1284 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 27 PID 2044 wrote to memory of 1200 2044 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 15 PID 2044 wrote to memory of 1200 2044 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 15 PID 2044 wrote to memory of 1200 2044 01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe"C:\Users\Admin\AppData\Local\Temp\01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe"C:\Users\Admin\AppData\Local\Temp\01ed65026a39848ebff9e894f97b83452824f5a7c11a026b8d5de560b2ca30d6.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044
-
-