Analysis
-
max time kernel
129s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe
Resource
win10v2004-20230915-en
General
-
Target
84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe
-
Size
322KB
-
MD5
eef6617def6f6e52cd7ad187eeb285a0
-
SHA1
d1d6ed84b5d1a691ff6e0cd097ac570a985428ad
-
SHA256
84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b
-
SHA512
7f8283d44949708e4baa63672218dc447cb044605574cf313d22a75d6b442c8ff4f92e88fbb79d9754a36eefaf8449f7f7efdf820555dea094c6d390b5f5b063
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3340 set thread context of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3400 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3340 wrote to memory of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 PID 3340 wrote to memory of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 PID 3340 wrote to memory of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 PID 3340 wrote to memory of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 PID 3340 wrote to memory of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 PID 3340 wrote to memory of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 PID 3340 wrote to memory of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 PID 3340 wrote to memory of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 PID 3340 wrote to memory of 3572 3340 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 88 PID 3572 wrote to memory of 3400 3572 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 89 PID 3572 wrote to memory of 3400 3572 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 89 PID 3572 wrote to memory of 3400 3572 84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe"C:\Users\Admin\AppData\Local\Temp\84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exeC:\Users\Admin\AppData\Local\Temp\84e5bb5bd446f4dc679ab86cc737c33c6d110cc06a163ae7aff300e72212a84b.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3400
-
-