Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09c5572a4d5eac974a1ca5e21a72294b.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
09c5572a4d5eac974a1ca5e21a72294b.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
09c5572a4d5eac974a1ca5e21a72294b.exe
-
Size
27KB
-
MD5
09c5572a4d5eac974a1ca5e21a72294b
-
SHA1
d6a1015e8243e8cefa7fee1fcda771cb1ff3d96d
-
SHA256
ff2c12f20f6cf7de894b215124226bf0e9196af577d4ac371196ed25f46e988a
-
SHA512
1cc6f68b7389b385c68a14b7825d7d5431e9acfb02b14ecc9521c8428270f75241a02b33f7c7f08ac5e1568324050c03b31f3bd3f89f71c3a1ef197621fd9675
-
SSDEEP
384:3n/VsAp+qD3ikQ9OavrQcsqCj0Shw2NQVm2fwH3IrE4vQzmeixNkVdfx:3tVD31Q9OavrXsF0yWk4Q4ozJijWfx
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4776 set thread context of 3304 4776 09c5572a4d5eac974a1ca5e21a72294b.exe 91 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4776 09c5572a4d5eac974a1ca5e21a72294b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4776 wrote to memory of 3304 4776 09c5572a4d5eac974a1ca5e21a72294b.exe 91 PID 4776 wrote to memory of 3304 4776 09c5572a4d5eac974a1ca5e21a72294b.exe 91 PID 4776 wrote to memory of 3304 4776 09c5572a4d5eac974a1ca5e21a72294b.exe 91 PID 4776 wrote to memory of 3304 4776 09c5572a4d5eac974a1ca5e21a72294b.exe 91 PID 4776 wrote to memory of 3304 4776 09c5572a4d5eac974a1ca5e21a72294b.exe 91 PID 4776 wrote to memory of 3304 4776 09c5572a4d5eac974a1ca5e21a72294b.exe 91 PID 4776 wrote to memory of 3304 4776 09c5572a4d5eac974a1ca5e21a72294b.exe 91 PID 4776 wrote to memory of 3304 4776 09c5572a4d5eac974a1ca5e21a72294b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\09c5572a4d5eac974a1ca5e21a72294b.exe"C:\Users\Admin\AppData\Local\Temp\09c5572a4d5eac974a1ca5e21a72294b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\09c5572a4d5eac974a1ca5e21a72294b.exeC:\Users\Admin\AppData\Local\Temp\09c5572a4d5eac974a1ca5e21a72294b.exe2⤵PID:3304
-