Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 21:08
Static task
static1
Behavioral task
behavioral1
Sample
e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe
Resource
win10v2004-20221111-en
General
-
Target
e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe
-
Size
137KB
-
MD5
f5d34e1d45f4563d98fb32e358de3e65
-
SHA1
802cc76892af225f26c95ebfcfeabcc8e8b44c96
-
SHA256
e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566
-
SHA512
59bed1147913d25807184a4e79f045750741994defdf9993d2d15611144274f6fb180a2067cb87de2e2c1bf06b00f13828c04b74ea1b8db195f7adca1bc8b41d
-
SSDEEP
3072:Mpc4EjbXwTNXNxDSz3Hf4zZM8JOp4XStTGqV9Es:gSjUpXHDOX0NOphtTvbZ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2024 set thread context of 940 2024 e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe 27 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2024 wrote to memory of 940 2024 e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe 27 PID 2024 wrote to memory of 940 2024 e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe 27 PID 2024 wrote to memory of 940 2024 e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe 27 PID 2024 wrote to memory of 940 2024 e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe 27 PID 2024 wrote to memory of 940 2024 e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe"C:\Users\Admin\AppData\Local\Temp\e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe"C:\Users\Admin\AppData\Local\Temp\e0c9ee49d3b9200fdff416ff151af310bc7eb51e0539eeacd80d971dec324566.exe"2⤵PID:940
-