Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe
Resource
win10v2004-20220812-en
General
-
Target
ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe
-
Size
86KB
-
MD5
d59539dc232146e2978755aeb8434e1a
-
SHA1
d893140f583bcb9b72b5c271060672e055177e78
-
SHA256
ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2
-
SHA512
10e90c0fa5dfaa5f8f9add4a158705c9c7d789316af04e1e6b0134098ee38a9d36ee4ae15160bbd65b8d30a0cf59b1434d297a3c740781b01f1226d77c404cc2
-
SSDEEP
768:N/IwI4gTtUReg/UXssPzfQE6rrDNswNX9pQUnbmhGOOOOOOOaHaJB4VQgvBAfBKb:ed4gTtUMgQzfWrrDNhLGKYBuOw
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otoy1yj2.exe ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otoy1yj2.exe ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 684 1668 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 684 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1668 wrote to memory of 684 1668 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 27 PID 1668 wrote to memory of 684 1668 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 27 PID 1668 wrote to memory of 684 1668 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 27 PID 1668 wrote to memory of 684 1668 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 27 PID 1668 wrote to memory of 684 1668 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 27 PID 1668 wrote to memory of 684 1668 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 27 PID 684 wrote to memory of 1268 684 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 12 PID 684 wrote to memory of 1268 684 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 12 PID 684 wrote to memory of 1268 684 ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe"C:\Users\Admin\AppData\Local\Temp\ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe"C:\Users\Admin\AppData\Local\Temp\ce397b31afe75f0eb924ba06cf95b425790a22a0cf8ab0dcc17bc6cb35c54ed2.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:684
-
-