Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/02/2023, 09:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe
-
Size
1.0MB
-
MD5
b337aef2e21d2113969f421d307a0bfc
-
SHA1
7df37e41ac16b47449ebf8a978616781dfc53445
-
SHA256
493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8
-
SHA512
1fd001c0a47fd9de65582e561e89397c755c5c60088131b35b6c8b3cb21f25dab25ebdfccbdeb98f28c366efc0b1aa90b308f004024ec6ea6b62e495c589b908
-
SSDEEP
24576:btb20pkaCqT5TBWgNjVYMerbvM3wbOG16A:YVg5tjVYMerbvewv5
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1144-59-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1144-61-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1144-63-0x0000000000400000-0x000000000042B000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1088 set thread context of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1776 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 27 PID 1088 wrote to memory of 1776 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 27 PID 1088 wrote to memory of 1776 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 27 PID 1088 wrote to memory of 1776 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 27 PID 1088 wrote to memory of 384 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 28 PID 1088 wrote to memory of 384 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 28 PID 1088 wrote to memory of 384 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 28 PID 1088 wrote to memory of 384 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 28 PID 1088 wrote to memory of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29 PID 1088 wrote to memory of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29 PID 1088 wrote to memory of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29 PID 1088 wrote to memory of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29 PID 1088 wrote to memory of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29 PID 1088 wrote to memory of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29 PID 1088 wrote to memory of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29 PID 1088 wrote to memory of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29 PID 1088 wrote to memory of 1144 1088 493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe"C:\Users\Admin\AppData\Local\Temp\493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exeC:\Users\Admin\AppData\Local\Temp\493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe2⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exeC:\Users\Admin\AppData\Local\Temp\493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe2⤵PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exeC:\Users\Admin\AppData\Local\Temp\493239f65d67f05cfa86644937ace5a0ba83fb316babf3d1d66d21674eae78e8.exe2⤵PID:1144
-