Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02-12-2023 02:02
Static task
static1
Behavioral task
behavioral1
Sample
03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe
Resource
win10v2004-20231130-en
General
-
Target
03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe
-
Size
261KB
-
MD5
367dfe78943127f84173877a21eaa65d
-
SHA1
55cd0c0cc486369a80dd7c06cd729332ee567bff
-
SHA256
03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0
-
SHA512
8c32b422564f11d9cd4b87fa4f7bacf7a6427a5c55b8e8aadfd06d03f88173a0a560b3cae8025bee786aae351a59a348f3074a81ce3b5371694a4977bdf39665
-
SSDEEP
6144:nmCzynLdmU/U70bJSwuFuZy9c+KO7eKDA8IkLNrRA:xzuEtiGc+KO71Plr
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exedescription pid process target process PID 2284 set thread context of 2824 2284 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exedescription pid process target process PID 2284 wrote to memory of 2824 2284 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe PID 2284 wrote to memory of 2824 2284 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe PID 2284 wrote to memory of 2824 2284 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe PID 2284 wrote to memory of 2824 2284 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe PID 2284 wrote to memory of 2824 2284 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe PID 2284 wrote to memory of 2824 2284 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe PID 2284 wrote to memory of 2824 2284 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe PID 2284 wrote to memory of 2824 2284 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe 03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe"C:\Users\Admin\AppData\Local\Temp\03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe"C:\Users\Admin\AppData\Local\Temp\03aba6565981dde746c3bc4301303746d9a952d16ad40205c8905f7e4cbc05a0.exe"2⤵PID:2824