Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 01:26
Behavioral task
behavioral1
Sample
c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe
-
Size
186KB
-
MD5
13073ebe522b75413777ce5464ec0d56
-
SHA1
cf47c00c319e214612b8c01b43462af9d2abbaeb
-
SHA256
c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d
-
SHA512
39dbd987231636753456130ed240b5c67cd0cb7811d58f7dc578d2b10e027eae3391734891efa021a3ee950ad949e3e59f6cf2e3c64e6cc7a852fdd97ceafe52
-
SSDEEP
3072:rFvg4i9/EEr8Lk1NgK80lqLWeGONZyo5JkCIoCcQFmE1YLfth1XYWW:tgZL4LEV8kjbONZdkCI70jH2
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1184-59-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1184 set thread context of 2032 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2032 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 2032 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2032 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 27 PID 1184 wrote to memory of 2032 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 27 PID 1184 wrote to memory of 2032 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 27 PID 1184 wrote to memory of 2032 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 27 PID 1184 wrote to memory of 2032 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 27 PID 1184 wrote to memory of 2032 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 27 PID 1184 wrote to memory of 2032 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 27 PID 1184 wrote to memory of 2032 1184 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 27 PID 2032 wrote to memory of 1284 2032 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 14 PID 2032 wrote to memory of 1284 2032 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 14 PID 2032 wrote to memory of 1284 2032 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 14 PID 2032 wrote to memory of 1284 2032 c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe"C:\Users\Admin\AppData\Local\Temp\c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe"C:\Users\Admin\AppData\Local\Temp\c0c46f5be5d5739dc3a8e758b6bab7ed8883b58fc2bffd026147a38e7feb624d.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032
-
-