Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 18:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b323530396c73a0d5d791bb2e34fcdd.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b323530396c73a0d5d791bb2e34fcdd.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
0b323530396c73a0d5d791bb2e34fcdd.exe
-
Size
89KB
-
MD5
0b323530396c73a0d5d791bb2e34fcdd
-
SHA1
2c5753ef71190e81a0ab2e5358fb6da45e144cee
-
SHA256
7262263033e43cd28b582a8f5cdde204218dbe377b2593e2746e58fb2508f7a4
-
SHA512
5e41eb43262657c5131eeae46a467bf7ea4ab51a7e375c29d7989dc7e4820b3fef942659b293e57eaa354199943bb0c8d0db77e2582d7c096552f17c804bfb85
-
SSDEEP
1536:DFOnrduhbOAetTNOinDrZhQcnprVF9TGyjc:DFAdHAeB4idpxF9iyw
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iidd6ooi2.exe 0b323530396c73a0d5d791bb2e34fcdd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iidd6ooi2.exe 0b323530396c73a0d5d791bb2e34fcdd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 3024 1732 0b323530396c73a0d5d791bb2e34fcdd.exe 16 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3024 0b323530396c73a0d5d791bb2e34fcdd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1732 wrote to memory of 3024 1732 0b323530396c73a0d5d791bb2e34fcdd.exe 16 PID 1732 wrote to memory of 3024 1732 0b323530396c73a0d5d791bb2e34fcdd.exe 16 PID 1732 wrote to memory of 3024 1732 0b323530396c73a0d5d791bb2e34fcdd.exe 16 PID 1732 wrote to memory of 3024 1732 0b323530396c73a0d5d791bb2e34fcdd.exe 16 PID 1732 wrote to memory of 3024 1732 0b323530396c73a0d5d791bb2e34fcdd.exe 16 PID 1732 wrote to memory of 3024 1732 0b323530396c73a0d5d791bb2e34fcdd.exe 16 PID 3024 wrote to memory of 1068 3024 0b323530396c73a0d5d791bb2e34fcdd.exe 9 PID 3024 wrote to memory of 1068 3024 0b323530396c73a0d5d791bb2e34fcdd.exe 9 PID 3024 wrote to memory of 1068 3024 0b323530396c73a0d5d791bb2e34fcdd.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\0b323530396c73a0d5d791bb2e34fcdd.exe"C:\Users\Admin\AppData\Local\Temp\0b323530396c73a0d5d791bb2e34fcdd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\0b323530396c73a0d5d791bb2e34fcdd.exe"C:\Users\Admin\AppData\Local\Temp\0b323530396c73a0d5d791bb2e34fcdd.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024
-
-