Analysis
-
max time kernel
4s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 14:49
Behavioral task
behavioral1
Sample
d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe
-
Size
153KB
-
MD5
06e8d94677b65bb618c61917b2bdc7cd
-
SHA1
b5fbdbe02641d4692e34ddbd5f212759a963fda7
-
SHA256
d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e
-
SHA512
14cedd4509e998abbf87c1e2fb77595e431956a7e044844fe0f259c876a7c8f9956f8dcb72c4cd0071efb460a6ebe6445d9cfbc05dd5b284285861b51eb7a5c0
-
SSDEEP
3072:uSlqRgH9YRO55T1ldTLSYo3YqFYWPYY8F3x3+/ONIul+X:uokWdT1bLStNFYAr8FBgu
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1776-56-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1776-66-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1776 set thread context of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1776 wrote to memory of 1504 1776 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 27 PID 1504 wrote to memory of 1276 1504 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 11 PID 1504 wrote to memory of 1276 1504 d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe"C:\Users\Admin\AppData\Local\Temp\d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe"C:\Users\Admin\AppData\Local\Temp\d8affffa895ba6a1c637423716246306df8304a7265d8a6598e14408928d6a5e.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1504
-
-