Analysis
-
max time kernel
32s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 15:14
Static task
static1
Behavioral task
behavioral1
Sample
7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe
Resource
win10v2004-20220812-en
General
-
Target
7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe
-
Size
348KB
-
MD5
64590933fc0ef63b047bc0fe0463f5bf
-
SHA1
35f3dc03ad90f1fd8f114ae954cb897ab56230dc
-
SHA256
7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28
-
SHA512
a13309234a76d623a4c4fd5749fe8bbff825593391157031b338025b7cf83b14e6a54660d3cee0c560fdf79b52a9747475fb68d9f182e8780ee7f17bbb7bf904
-
SSDEEP
6144:xFjC1Wk/yib6xCJjSLm+xRzvltGoItS7DwqudAuLKQMBEPnUGDIOVq:x7kafxOjSy+7vlQtS7DZuROQMBEPnUGM
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1752-57-0x0000000000400000-0x00000000004C5000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 1752 1632 7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe 28 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1752 1632 7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe 28 PID 1632 wrote to memory of 1752 1632 7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe 28 PID 1632 wrote to memory of 1752 1632 7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe 28 PID 1632 wrote to memory of 1752 1632 7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe 28 PID 1632 wrote to memory of 1752 1632 7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe 28 PID 1632 wrote to memory of 1752 1632 7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe"C:\Users\Admin\AppData\Local\Temp\7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe"C:\Users\Admin\AppData\Local\Temp\7c3bec42a599d4f80b2c05cbac6ae7dd2038eb07f3a8875c75453834ca675b28.exe"2⤵PID:1752
-