Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe
Resource
win10v2004-20220812-en
General
-
Target
cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe
-
Size
79KB
-
MD5
26797ed47da1bd0f6612d22a2bf907f2
-
SHA1
f2f76024f88b57c57d949fc929de75e58bc03b09
-
SHA256
cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db
-
SHA512
848da2f68cf73717145693dd02408ee922412d2819a90cd62f41f3a49b7659f710c5b5feaa2337383db38bdd6d04739ce13508f77672d0bbc529a941eaadd99b
-
SSDEEP
1536:GHReXPPNRt58t54Cg9299KEpWLRuTAltuyLUBnXLBoUeOupeGKuE:GHRsnNRtK5LKEkLLyXumIeGKT
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1712 set thread context of 1160 1712 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1160 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 1160 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1160 1712 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 27 PID 1712 wrote to memory of 1160 1712 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 27 PID 1712 wrote to memory of 1160 1712 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 27 PID 1712 wrote to memory of 1160 1712 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 27 PID 1712 wrote to memory of 1160 1712 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 27 PID 1712 wrote to memory of 1160 1712 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 27 PID 1712 wrote to memory of 1160 1712 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 27 PID 1712 wrote to memory of 1160 1712 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 27 PID 1160 wrote to memory of 1224 1160 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 14 PID 1160 wrote to memory of 1224 1160 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 14 PID 1160 wrote to memory of 1224 1160 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 14 PID 1160 wrote to memory of 1224 1160 cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe"C:\Users\Admin\AppData\Local\Temp\cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exeC:\Users\Admin\AppData\Local\Temp\cae33a716e499f8208db80105961c6bd808abcd869054cea6ccbbb470d71d3db.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160
-
-