Analysis
-
max time kernel
7s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe
Resource
win10v2004-20220812-en
General
-
Target
23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe
-
Size
79KB
-
MD5
ea777161ae80d3b7ca578f99efa072da
-
SHA1
d2d9bac19ac17bbdd5cf0ddf9d17e938faf18b8c
-
SHA256
23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c
-
SHA512
aa9e18f47210f91645f05702eb1e6687113c283c8c9a3b525bd3978e8187b476cf58b0243d3676703485a46499541ca8b90d0229fd9f9aa351876ee611b2bec2
-
SSDEEP
1536:8/wfW5aZlV930fJQFPQ/Vfi/mtbaz77777g7774o/8vLZzJ77a:aw5Nt0BzCmtuz77777g777bE5J77a
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 240 set thread context of 1672 240 23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe 28 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 240 wrote to memory of 1672 240 23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe 28 PID 240 wrote to memory of 1672 240 23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe 28 PID 240 wrote to memory of 1672 240 23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe 28 PID 240 wrote to memory of 1672 240 23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe 28 PID 240 wrote to memory of 1672 240 23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe 28 PID 240 wrote to memory of 1672 240 23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe 28 PID 240 wrote to memory of 1672 240 23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe"C:\Users\Admin\AppData\Local\Temp\23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe"C:\Users\Admin\AppData\Local\Temp\23accc335c93b189657c2d34d191d9097fb39b6b2d4585b50ae5b7d41b182e0c.exe"2⤵PID:1672
-