Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 02:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe
Resource
win7-20231025-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe
Resource
win10v2004-20231127-en
9 signatures
150 seconds
General
-
Target
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe
-
Size
435KB
-
MD5
b881374bc4264f837660e1d82d81d19b
-
SHA1
5068bf4bbb30a983cabe7ffe937ce099f11c1588
-
SHA256
eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c
-
SHA512
30b0e3f5f551d898c2ff2098f67a6190bc1958e9565c59e31e0f5af6528bff5b1492e583f8be9967494de9a5a547680081cfc062f978f6e2db3bb7b6c254e2b0
-
SSDEEP
12288:xu0KGq6Kc8S8tpWchUpSnB7itr4H444t:xuEjE7D9nB7i94H444t
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2604 set thread context of 2612 2604 eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe 28 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2612 2604 eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe 28 PID 2604 wrote to memory of 2612 2604 eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe 28 PID 2604 wrote to memory of 2612 2604 eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe 28 PID 2604 wrote to memory of 2612 2604 eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe 28 PID 2604 wrote to memory of 2612 2604 eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe"C:\Users\Admin\AppData\Local\Temp\eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe"C:\Users\Admin\AppData\Local\Temp\eae0fc3297708ca9a66fad777210caa9c58656ceffce6ff029d9c6208861832c.exe"2⤵PID:2612
-