Analysis
-
max time kernel
153s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
06be3b71909925b0afede1826816e05f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
06be3b71909925b0afede1826816e05f.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
06be3b71909925b0afede1826816e05f.exe
-
Size
577KB
-
MD5
06be3b71909925b0afede1826816e05f
-
SHA1
878b0e859e358637276e37111786a414785b305f
-
SHA256
73de560b4bac32d1735d4fb0f8fdcccdb5b4c074dbbde55f58574622a0e303c8
-
SHA512
e32f2c1113337d3ecdb3eb79cc1f9dde5d5a081527cd5a9c98e055b9d3bd141ac559b17dedfb3d166a8316ab3c6defa4110cf790faa4ef030f505fad10722c29
-
SSDEEP
12288:SPswateaTRIi8oK/lGRgOUqmq9kR6lhKX4B3a9FsqJKB57d8f:SPswadaitK/cRgOnmq9g65B36rKX6
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4888 set thread context of 4360 4888 06be3b71909925b0afede1826816e05f.exe 91 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4888 06be3b71909925b0afede1826816e05f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4360 4888 06be3b71909925b0afede1826816e05f.exe 91 PID 4888 wrote to memory of 4360 4888 06be3b71909925b0afede1826816e05f.exe 91 PID 4888 wrote to memory of 4360 4888 06be3b71909925b0afede1826816e05f.exe 91 PID 4888 wrote to memory of 4360 4888 06be3b71909925b0afede1826816e05f.exe 91 PID 4888 wrote to memory of 4360 4888 06be3b71909925b0afede1826816e05f.exe 91 PID 4888 wrote to memory of 4360 4888 06be3b71909925b0afede1826816e05f.exe 91 PID 4888 wrote to memory of 4360 4888 06be3b71909925b0afede1826816e05f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\06be3b71909925b0afede1826816e05f.exe"C:\Users\Admin\AppData\Local\Temp\06be3b71909925b0afede1826816e05f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\06be3b71909925b0afede1826816e05f.exeC:\Users\Admin\AppData\Local\Temp\06be3b71909925b0afede1826816e05f.exe2⤵PID:4360
-