Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 14:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
01ec980eefb52c397090c056a9750046.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
01ec980eefb52c397090c056a9750046.exe
-
Size
240KB
-
MD5
01ec980eefb52c397090c056a9750046
-
SHA1
a46b271d96183f2ce6cc11f9525ec982ebcd3b1a
-
SHA256
bdd11d08ab41c7aaaf6398a12a2aaac21b1254a8d6140aa7fc6405e802be8a62
-
SHA512
bce48d4859b177d24cdcbf9afb308660a8ab1988fc6ae56157bea2d6506e4eadb57b56ae157ca64e5ff7b3cb041f15127a9ac06126916470161175dcc7346143
-
SSDEEP
6144:gLdRE99cd91iZb3aztAwz3KnIgRqYBldcSKBK7Po:gLdRE99cDAZb3AtAwTKnLRflaSK87
Malware Config
Signatures
-
Processes:
01ec980eefb52c397090c056a9750046.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 01ec980eefb52c397090c056a9750046.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
01ec980eefb52c397090c056a9750046.exe01ec980eefb52c397090c056a9750046.exedescription pid process target process PID 2964 set thread context of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 set thread context of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe -
Suspicious use of SetWindowsHookAW 1 IoCs
Processes:
01ec980eefb52c397090c056a9750046.exepid process 2964 01ec980eefb52c397090c056a9750046.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
01ec980eefb52c397090c056a9750046.exe01ec980eefb52c397090c056a9750046.exe01ec980eefb52c397090c056a9750046.exedescription pid process target process PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 2964 wrote to memory of 4028 2964 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 wrote to memory of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 wrote to memory of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 wrote to memory of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 wrote to memory of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 wrote to memory of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 wrote to memory of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 wrote to memory of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 wrote to memory of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 4028 wrote to memory of 3096 4028 01ec980eefb52c397090c056a9750046.exe 01ec980eefb52c397090c056a9750046.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe PID 3096 wrote to memory of 1248 3096 01ec980eefb52c397090c056a9750046.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01ec980eefb52c397090c056a9750046.exe"C:\Users\Admin\AppData\Local\Temp\01ec980eefb52c397090c056a9750046.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookAW
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\01ec980eefb52c397090c056a9750046.exe"C:\Users\Admin\AppData\Local\Temp\01ec980eefb52c397090c056a9750046.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\01ec980eefb52c397090c056a9750046.exeC:\Users\Admin\AppData\Local\Temp\01ec980eefb52c397090c056a9750046.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet explorer\iexplore.exe"C:\Program Files (x86)\Internet explorer\iexplore.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3096-10-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/3096-8-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/3096-7-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/3096-5-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/3096-11-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/4028-2-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4028-3-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4028-1-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4028-0-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4028-4-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4028-6-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB