Analysis
-
max time kernel
30s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 20:25
Static task
static1
Behavioral task
behavioral1
Sample
bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe
-
Size
207KB
-
MD5
fb886e87b25ab669fe372c926f42fc7d
-
SHA1
700a1ff5bd112f4a533895249be7f4c15cbab45a
-
SHA256
bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262
-
SHA512
3ae8e59662991ff9331d4f0532cc7b52bcf003d5038dc4839e48809922eb321a92fd6e5f80976b668c473866d3e22f99406f9d1a6a8bd84e041fe2da8a6992de
-
SSDEEP
6144:B/8EzLAdZUwr7d5GssFjBamEmBZKO88za:2EzLAdqG7dbsFgmEmqT
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1620 set thread context of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28 PID 1620 wrote to memory of 1516 1620 bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe"C:\Users\Admin\AppData\Local\Temp\bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe"C:\Users\Admin\AppData\Local\Temp\bf65284ee0dd13e041ae3b390f46c91bc4dcbe3902ff7994f34784a9f60f2262.exe"2⤵PID:1516
-