Analysis
-
max time kernel
29s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe
Resource
win10v2004-20220812-en
General
-
Target
3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe
-
Size
59KB
-
MD5
f77e9b212ff7f353c6bbc23355b15c73
-
SHA1
ec320a5a8e5c3cce08eab051c3707ec801c77f8f
-
SHA256
3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee
-
SHA512
9b1c16de403f22616bff728ef6df5bd4613b6c282d59ef47e633902cc80d9ed85dad6d033649b5a0357c002a6116a2912a2f2f9c2e926a98cd87d6d71973aa05
-
SSDEEP
1536:FyyR9IUrTZeGD525DFtYLV2iL6OGuF1h1nPXYvdg8lkVFj/Q:FyyRtrteGD+Hsh6efIvR4u
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jo96doty.exe 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jo96doty.exe 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 904 set thread context of 1380 904 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1380 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 904 wrote to memory of 1380 904 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 27 PID 904 wrote to memory of 1380 904 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 27 PID 904 wrote to memory of 1380 904 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 27 PID 904 wrote to memory of 1380 904 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 27 PID 904 wrote to memory of 1380 904 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 27 PID 904 wrote to memory of 1380 904 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 27 PID 1380 wrote to memory of 1244 1380 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 15 PID 1380 wrote to memory of 1244 1380 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 15 PID 1380 wrote to memory of 1244 1380 3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe"C:\Users\Admin\AppData\Local\Temp\3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe"C:\Users\Admin\AppData\Local\Temp\3c4fbbed8856fe74a780f97991b02e602949e9e31f6dcb04966e81d741598eee.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380
-
-