Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09/02/2023, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
Launcher Fenix.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Launcher Fenix.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
Launcher Fenix.exe
-
Size
397KB
-
MD5
d99bb55b57712065bc88be297c1da38c
-
SHA1
fb6662dd31e8e5be380fbd7a33a50a45953fe1e7
-
SHA256
122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb
-
SHA512
3eb5d57faea4c0146c2af40102deaac18235b379f5e81fe35a977b642e3edf70704c8cedd835e94f27b04c8413968f7469fccf82c1c9339066d38d3387c71b17
-
SSDEEP
3072:puzvch1rugYc4wqYSRR756K7ItBjgXHUYCnlK:Wch1aIqYSRVM+unlK
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2020 javaw.exe 2020 javaw.exe 2020 javaw.exe 2020 javaw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2020 1664 Launcher Fenix.exe 28 PID 1664 wrote to memory of 2020 1664 Launcher Fenix.exe 28 PID 1664 wrote to memory of 2020 1664 Launcher Fenix.exe 28 PID 1664 wrote to memory of 2020 1664 Launcher Fenix.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher Fenix.exe"C:\Users\Admin\AppData\Local\Temp\Launcher Fenix.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Launcher Fenix.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2020
-