Analysis
-
max time kernel
127s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2023 05:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe
Resource
win10-20230915-en
windows10-1703-x64
2 signatures
150 seconds
General
-
Target
8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe
-
Size
393KB
-
MD5
72efecfeeff8484294dd135a0b607d2a
-
SHA1
b6b24d4f4791d127a1cbe4ae7b373aa277d45752
-
SHA256
8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16
-
SHA512
0faaf5ecb820090376239e1ed73a119e383a349c6b00c1db455c55c92627a35560425c7d032e032606beaaf1012c26fca27203231bf9b3c09cee0d4eaef0e178
-
SSDEEP
12288:rNvuqiG59ouTkP4fVroRyUNXfUD/Bh4l1Sa:rNvJ5O4fWRyU9UD/cls
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4668 set thread context of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4668 wrote to memory of 600 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 72 PID 4668 wrote to memory of 600 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 72 PID 4668 wrote to memory of 600 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 72 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73 PID 4668 wrote to memory of 1388 4668 8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe"C:\Users\Admin\AppData\Local\Temp\8c4588d66cdd3bf56bca2903671ac2511854aa8629ee190fea4d442a6aa29e16.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1388
-