Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe
Resource
win10v2004-20220812-en
General
-
Target
c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe
-
Size
10.3MB
-
MD5
6f9a041ed079c958c4b8eb4ca3f2ff86
-
SHA1
11962dc141cb513748f1ae124a9c2f676442757c
-
SHA256
c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd
-
SHA512
c9caa973ab245a17b23dcea4c4e42567746c6944a3f46315b124b58f28069f96c5828063bd4461979c22c512dc3f2660d00c2cbc1860a2ebc200865c471163e1
-
SSDEEP
49152:1LERRabSia5L6B1iDboEHQ7enXqf5V5ZmiHu8RzoNvzWpxMKT0X6DM/HaLzZKe2x:1LERRVqf5IKzopzWpxMzaZK/hjt
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 900 set thread context of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 900 wrote to memory of 2040 900 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 27 PID 2040 wrote to memory of 1212 2040 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 28 PID 2040 wrote to memory of 1212 2040 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 28 PID 2040 wrote to memory of 1212 2040 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 28 PID 2040 wrote to memory of 1212 2040 c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe"C:\Users\Admin\AppData\Local\Temp\c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe"C:\Users\Admin\AppData\Local\Temp\c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" ext "C:\Users\Admin\AppData\Local\Temp\c077da8e022707cd83a60fbb4473fc26f156fb723d6a8103874b73aaa3102cdd.exe"3⤵PID:1212
-
-