Analysis
-
max time kernel
9s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 19:17
Static task
static1
Behavioral task
behavioral1
Sample
eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe
-
Size
172KB
-
MD5
2f159cbf0194ab1fd97cf7b188250831
-
SHA1
6b33fb531033918ad4eea3ac579ae74dafff869e
-
SHA256
eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1
-
SHA512
4fa898f0b867242d5f3bfe637a01f3f09e738c9e10bddba3bdea450a4a9e8c595b799d02575f55f3c13a000dc449f915da87e51570a9f5d6e17beaf3dcec36fa
-
SSDEEP
3072:5EUP0Fx0k4MWJjFalEadPFO0c6p866zng9mu7ApfX38F:m7MXk
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 1960 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1960 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 1960 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1960 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 28 PID 1800 wrote to memory of 1960 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 28 PID 1800 wrote to memory of 1960 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 28 PID 1800 wrote to memory of 1960 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 28 PID 1800 wrote to memory of 1960 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 28 PID 1800 wrote to memory of 1960 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 28 PID 1800 wrote to memory of 1960 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 28 PID 1800 wrote to memory of 1960 1800 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 28 PID 1960 wrote to memory of 1256 1960 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 17 PID 1960 wrote to memory of 1256 1960 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 17 PID 1960 wrote to memory of 1256 1960 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 17 PID 1960 wrote to memory of 1256 1960 eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe"C:\Users\Admin\AppData\Local\Temp\eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe"C:\Users\Admin\AppData\Local\Temp\eec9802162f81953d252b1eb7ff4c551d849dc32b2d9de32d5ef8984fb6221c1.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960
-
-