Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe
-
Size
72KB
-
MD5
b0cf9d464427cfaf3a622b1aacd4bf49
-
SHA1
69830cbfe44030327a0fc40862519de3cfda5235
-
SHA256
bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f
-
SHA512
ed3543d077573f942b08ff3736686331ecb1105b2e80433e678878c153bc4550e978fe1c645fd8516acdd5e8e71d11b5ee4f03122c1b17f9d12a38eeead718b6
-
SSDEEP
1536:xqM5qoTm0GUPMWLpbQ/UTO7EkrE6tsSRXT/DZ:goTm3UrccDcnZ
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4o85oty.exe bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4o85oty.exe bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 816 1032 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 816 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1032 wrote to memory of 816 1032 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 28 PID 1032 wrote to memory of 816 1032 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 28 PID 1032 wrote to memory of 816 1032 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 28 PID 1032 wrote to memory of 816 1032 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 28 PID 1032 wrote to memory of 816 1032 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 28 PID 1032 wrote to memory of 816 1032 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 28 PID 816 wrote to memory of 1232 816 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 13 PID 816 wrote to memory of 1232 816 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 13 PID 816 wrote to memory of 1232 816 bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe"C:\Users\Admin\AppData\Local\Temp\bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe"C:\Users\Admin\AppData\Local\Temp\bd5b27aa14e250461262e66de57be41f2e84a26e13cce30167157fb19a858b7f.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:816
-
-