Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe
Resource
win10v2004-20220812-en
General
-
Target
d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe
-
Size
404KB
-
MD5
05f0d4ccd9b6a09d6a06f27d38fb77b3
-
SHA1
a0937105f769b31d328046e60f25799246d29f08
-
SHA256
d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585
-
SHA512
0ada478bf0074e372a86c88addddba6dc67ceb1df44b7bfd385d143abb96fd2378368e97418e4ef429c3ede9721bb3296efa8f555092bac5eaa6c4128ac96757
-
SSDEEP
3072:kEEZ4u3vLpJyG20POkmP51GvOppQP2c9g9LJqXlvkQO183RCW:B1hpJelvNA8/
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 1240 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1240 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 1240 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1240 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 28 PID 1632 wrote to memory of 1240 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 28 PID 1632 wrote to memory of 1240 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 28 PID 1632 wrote to memory of 1240 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 28 PID 1632 wrote to memory of 1240 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 28 PID 1632 wrote to memory of 1240 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 28 PID 1632 wrote to memory of 1240 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 28 PID 1632 wrote to memory of 1240 1632 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 28 PID 1240 wrote to memory of 1208 1240 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 7 PID 1240 wrote to memory of 1208 1240 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 7 PID 1240 wrote to memory of 1208 1240 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 7 PID 1240 wrote to memory of 1208 1240 d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe 7
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe"C:\Users\Admin\AppData\Local\Temp\d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exeC:\Users\Admin\AppData\Local\Temp\d24ba8ab39c5c47a7d4fca5d443148cde1231bde479c2f0d51a184a0927e1585.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1240
-
-