Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
19927a9643799801586613379d239298.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
19927a9643799801586613379d239298.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
19927a9643799801586613379d239298.exe
-
Size
84KB
-
MD5
19927a9643799801586613379d239298
-
SHA1
f88bf156a05f574bd2e8fb7b94466ddf0c7fc594
-
SHA256
bdca7275c2df84194e7be64aa78983e511c019a9c3f54b9a2ae27b3cff00a161
-
SHA512
336e9cc0d44568eaf6de9040fcb22b4a602f8909648144817cf9703d50a656d51647e1c9117a7021df9030ab6535777003e382f90495ad327f29c801146dd7c9
-
SSDEEP
1536:txj2iAb0mg5Tf9u8vVjYCgz/DJHdTNRpJ66tSlBXi:/j2iAbxgZfYWtutHdhRj664Hy
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4456 set thread context of 3020 4456 19927a9643799801586613379d239298.exe 93 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3020 19927a9643799801586613379d239298.exe 3020 19927a9643799801586613379d239298.exe 3020 19927a9643799801586613379d239298.exe 3020 19927a9643799801586613379d239298.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4456 wrote to memory of 3020 4456 19927a9643799801586613379d239298.exe 93 PID 4456 wrote to memory of 3020 4456 19927a9643799801586613379d239298.exe 93 PID 4456 wrote to memory of 3020 4456 19927a9643799801586613379d239298.exe 93 PID 4456 wrote to memory of 3020 4456 19927a9643799801586613379d239298.exe 93 PID 4456 wrote to memory of 3020 4456 19927a9643799801586613379d239298.exe 93 PID 3020 wrote to memory of 3512 3020 19927a9643799801586613379d239298.exe 55 PID 3020 wrote to memory of 3512 3020 19927a9643799801586613379d239298.exe 55 PID 3020 wrote to memory of 3512 3020 19927a9643799801586613379d239298.exe 55 PID 3020 wrote to memory of 3512 3020 19927a9643799801586613379d239298.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe"C:\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe"C:\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe" :\Users\Admin\AppData\Local\Temp\19927a9643799801586613379d239298.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020
-
-