Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05-10-2023 18:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
2.1MB
-
MD5
19fdcf545db7fca0b034194e30e1e235
-
SHA1
6bf9922a70bff28c1f60bfc68814c0565439f04b
-
SHA256
231ac65c92049a0171a7bd6e10360bda388edf7b3ff7196b1ff0c6e07589ceca
-
SHA512
106a1ce0eb3ca9c3902bddce9cd0d2c7c13b6eb27a5e75ef0d80eac430473321dbdf7fce389ce87f65fbd1c24a19b2df406b7dd5686da68d8a450d6b1fa2084e
-
SSDEEP
24576:2P+HSWxc52h9A1Md0Xb76a9DhvhaLbwcWBCK142GaJkmKL:U52h9A5XP6a3vqbwvcKvJk1L
Score
6/10
Malware Config
Signatures
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 2072 2208 tmp.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2736 2208 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 2072 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2072 2208 tmp.exe 28 PID 2208 wrote to memory of 2736 2208 tmp.exe 29 PID 2208 wrote to memory of 2736 2208 tmp.exe 29 PID 2208 wrote to memory of 2736 2208 tmp.exe 29 PID 2208 wrote to memory of 2736 2208 tmp.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 1362⤵
- Program crash
PID:2736
-