Analysis
-
max time kernel
144s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe
Resource
win10v2004-20220812-en
General
-
Target
1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe
-
Size
89KB
-
MD5
84e4fdb4b85764f0439a1eb20e99b220
-
SHA1
a89067651bea34173282cc33eb84b64f8c2d5ae0
-
SHA256
1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13
-
SHA512
e77e9eda4dfaba8b0bfb69a21e60cf06e49abed29b0a16a11e81e335a86267565348b654d9ed79e8af67318125fa1b25b4bd00d4395a474d05a21641fb7c767e
-
SSDEEP
1536:nS2EJEPod7csesHUa8JgEhHIxKaDVTkeQp13Ttp8FWe:nS2E9NHUa2gUfa6eQp13pe
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1556-58-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1556-61-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1556-62-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1556-66-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1556-65-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1556-67-0x0000000000400000-0x0000000002B10000-memory.dmp upx behavioral1/memory/1556-68-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1556-69-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1292 set thread context of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 1556 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 1556 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 1556 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 1556 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26 PID 1292 wrote to memory of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26 PID 1292 wrote to memory of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26 PID 1292 wrote to memory of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26 PID 1292 wrote to memory of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26 PID 1292 wrote to memory of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26 PID 1292 wrote to memory of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26 PID 1292 wrote to memory of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26 PID 1292 wrote to memory of 1556 1292 1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe"C:\Users\Admin\AppData\Local\Temp\1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe"C:\Users\Admin\AppData\Local\Temp\1f9972f1984be82836f341c9318232991d07671a6dcdafa5769f96b74a984e13.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-