Analysis
-
max time kernel
36s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe
Resource
win10v2004-20220812-en
General
-
Target
95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe
-
Size
236KB
-
MD5
7b3517b826a5d5b0e254ba8e57d972c2
-
SHA1
3d0a870497e31278c9ed42a55d5cd938f39be889
-
SHA256
95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1
-
SHA512
67bb889c24121e0f2fd53d3fc9be091fa4dcc834d27b1614a7937612a14e9b888f8c54d862ba1135dd83eb7afb161d356b673caf6895cfab6c454bff5e2e0382
-
SSDEEP
3072:QcAk+x+44dia8japi7+z/LYCMuEjKBiTZQaT0HhXxy/xS1wfzf6EHK:Qc52+qapi0/LYC/EjKBiFBEhKjxK
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1676 set thread context of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 PID 1676 wrote to memory of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 PID 1676 wrote to memory of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 PID 1676 wrote to memory of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 PID 1676 wrote to memory of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 PID 1676 wrote to memory of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 PID 1676 wrote to memory of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 PID 1676 wrote to memory of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 PID 1676 wrote to memory of 1220 1676 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 28 PID 1220 wrote to memory of 1244 1220 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 16 PID 1220 wrote to memory of 1244 1220 95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe"C:\Users\Admin\AppData\Local\Temp\95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe"C:\Users\Admin\AppData\Local\Temp\95cba194144db11e8a9c47468d1475fbf2394212009f11cf74c54e4843290fe1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1220
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244