Analysis
-
max time kernel
174s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe
-
Size
728KB
-
MD5
740e01ca913de68ffc24998c1f003067
-
SHA1
e94c5e240c19a521601893aec8960aa66bfbe0c0
-
SHA256
ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1
-
SHA512
0414755bfd6596adf778e3a44367f93d3f410869bdd50098169f258013a0400114fda929a11658d7e57d8c385ac78ea935505c07c4485ac94339830c621bdd4f
-
SSDEEP
12288:i2iN4yiRJU/Wcg39C3GghIxojeowYOZE/aMfAgykwpubeVpI0lRXSq:i19FeXNC3Gg+xo6ZZEyMogyJube1Ri
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4512 set thread context of 3232 4512 ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe 101 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3232 ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe 3232 ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4512 wrote to memory of 3232 4512 ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe 101 PID 4512 wrote to memory of 3232 4512 ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe 101 PID 4512 wrote to memory of 3232 4512 ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe 101 PID 4512 wrote to memory of 3232 4512 ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe 101 PID 4512 wrote to memory of 3232 4512 ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe 101 PID 4512 wrote to memory of 3232 4512 ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe"C:\Users\Admin\AppData\Local\Temp\ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe"C:\Users\Admin\AppData\Local\Temp\ef6d2c44de401edb2099c5a718cd59d79df97294a8f2f32e2c0929d6aae2e3f1_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-