Analysis
-
max time kernel
62s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe
Resource
win10v2004-20221111-en
General
-
Target
914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe
-
Size
75KB
-
MD5
f80374076e02cf485810f6dc9d58151a
-
SHA1
71ad6e77c3f54159bd34351cd1aba95dca17b6df
-
SHA256
914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af
-
SHA512
09309f2620f2bc4d9a8a51d88f00986f3fcafe204a452f3e3caf86104c77f5b9b8ce4fd16f857f2821b19d811ab9ba9bdbf398c55d38dab067e8e7823144cbe7
-
SSDEEP
768:o5tj6WixRjuwRDCaI3lhjtDw/XZd9Kbjobh7v8X1w1mqspegyV0DIEq+:o5tjKMwtCVwvNKH2hr84spPsq
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jyoe2o7et.exe 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jyoe2o7et.exe 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 576 set thread context of 1344 576 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1344 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 576 wrote to memory of 1344 576 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 28 PID 576 wrote to memory of 1344 576 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 28 PID 576 wrote to memory of 1344 576 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 28 PID 576 wrote to memory of 1344 576 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 28 PID 576 wrote to memory of 1344 576 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 28 PID 576 wrote to memory of 1344 576 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 28 PID 1344 wrote to memory of 1252 1344 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 16 PID 1344 wrote to memory of 1252 1344 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 16 PID 1344 wrote to memory of 1252 1344 914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe"C:\Users\Admin\AppData\Local\Temp\914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe"C:\Users\Admin\AppData\Local\Temp\914743c9adf3d20d9c526d183ef7fc807f05065f0e3f937fcbe416c28eef71af.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1344
-
-