Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:27
Static task
static1
Behavioral task
behavioral1
Sample
67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe
Resource
win10v2004-20220812-en
General
-
Target
67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe
-
Size
54KB
-
MD5
e623fa41d5df762ef3fb185b92a4ee36
-
SHA1
72d63c4eb50370765c776f1dd86100accff9058c
-
SHA256
67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286
-
SHA512
c5ee27d5756a88c130427e3a0d0440e6eafd9c52a69fc29de054e5b5600a6a0bba5b76daa06e075d55369f2f16199131d739db86ed7bf3b677a5858aa61b75b6
-
SSDEEP
768:VCQXtb3VdFbaeNsovJ1fgg/jTVa4MT87G9kVTiiYZe6Dm9Wb7rT364c0L1hF:VxV5sU1f3T9niiIe6D4Wn64JLLF
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exedescription pid process target process PID 1160 set thread context of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exepid process 1868 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 1868 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exedescription pid process target process PID 1160 wrote to memory of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe PID 1160 wrote to memory of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe PID 1160 wrote to memory of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe PID 1160 wrote to memory of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe PID 1160 wrote to memory of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe PID 1160 wrote to memory of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe PID 1160 wrote to memory of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe PID 1160 wrote to memory of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe PID 1160 wrote to memory of 1868 1160 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe PID 1868 wrote to memory of 1276 1868 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe Explorer.EXE PID 1868 wrote to memory of 1276 1868 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe Explorer.EXE PID 1868 wrote to memory of 1276 1868 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe Explorer.EXE PID 1868 wrote to memory of 1276 1868 67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe"C:\Users\Admin\AppData\Local\Temp\67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exeC:\Users\Admin\AppData\Local\Temp\67e16f32a0cf9fa25fd4608a12e1e44c364cf3becbfdbec60e2f957944836286.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868