Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 19:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0e6c4a7c9b649b4b511b39a76248d506.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e6c4a7c9b649b4b511b39a76248d506.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0e6c4a7c9b649b4b511b39a76248d506.exe
-
Size
4.4MB
-
MD5
0e6c4a7c9b649b4b511b39a76248d506
-
SHA1
6dab5f918c20d8f43f2052a1043f4a5387599fd1
-
SHA256
e2884b5661c11864376fd36dc47ef22e2f809c57529c4efe15131a64a7a38e6c
-
SHA512
71c5565ca2e5fbba1e987ad28e04480cca7caa6e2804742284f51c57fbc6401481835e78543cebf5484a4b8d5d8d0b96fbd70cded0c79c377d20dffeb7913da3
-
SSDEEP
49152:kqWJLFHPYzdVy43kz6rcViF9hBjSZxtvxPscNznmAMCz0BAjKWsl98Q1F0foUci0:kbzvYzCgHjSbscNCpBAjPogw9qa3IPk
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2236 0e6c4a7c9b649b4b511b39a76248d506.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2236 0e6c4a7c9b649b4b511b39a76248d506.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2236 0e6c4a7c9b649b4b511b39a76248d506.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2872 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 28 PID 2236 wrote to memory of 2872 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 28 PID 2236 wrote to memory of 2872 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 28 PID 2236 wrote to memory of 2872 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 28 PID 2236 wrote to memory of 2872 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 28 PID 2236 wrote to memory of 2872 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 28 PID 2236 wrote to memory of 2872 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 28 PID 2236 wrote to memory of 2824 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 29 PID 2236 wrote to memory of 2824 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 29 PID 2236 wrote to memory of 2824 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 29 PID 2236 wrote to memory of 2824 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 29 PID 2236 wrote to memory of 2824 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 29 PID 2236 wrote to memory of 2824 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 29 PID 2236 wrote to memory of 2824 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 29 PID 2236 wrote to memory of 2876 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 30 PID 2236 wrote to memory of 2876 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 30 PID 2236 wrote to memory of 2876 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 30 PID 2236 wrote to memory of 2876 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 30 PID 2236 wrote to memory of 2876 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 30 PID 2236 wrote to memory of 2876 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 30 PID 2236 wrote to memory of 2876 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 30 PID 2236 wrote to memory of 2240 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 31 PID 2236 wrote to memory of 2240 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 31 PID 2236 wrote to memory of 2240 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 31 PID 2236 wrote to memory of 2240 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 31 PID 2236 wrote to memory of 2240 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 31 PID 2236 wrote to memory of 2240 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 31 PID 2236 wrote to memory of 2240 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 31 PID 2236 wrote to memory of 2720 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 32 PID 2236 wrote to memory of 2720 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 32 PID 2236 wrote to memory of 2720 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 32 PID 2236 wrote to memory of 2720 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 32 PID 2236 wrote to memory of 2720 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 32 PID 2236 wrote to memory of 2720 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 32 PID 2236 wrote to memory of 2720 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 32 PID 2236 wrote to memory of 2752 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 33 PID 2236 wrote to memory of 2752 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 33 PID 2236 wrote to memory of 2752 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 33 PID 2236 wrote to memory of 2752 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 33 PID 2236 wrote to memory of 2752 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 33 PID 2236 wrote to memory of 2752 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 33 PID 2236 wrote to memory of 2752 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 33 PID 2236 wrote to memory of 2512 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 34 PID 2236 wrote to memory of 2512 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 34 PID 2236 wrote to memory of 2512 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 34 PID 2236 wrote to memory of 2512 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 34 PID 2236 wrote to memory of 2512 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 34 PID 2236 wrote to memory of 2512 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 34 PID 2236 wrote to memory of 2512 2236 0e6c4a7c9b649b4b511b39a76248d506.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e6c4a7c9b649b4b511b39a76248d506.exe"C:\Users\Admin\AppData\Local\Temp\0e6c4a7c9b649b4b511b39a76248d506.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Local\Temp\data\Codejock.Controls.Unicode.v12.0.2.ocx" /s2⤵PID:2872
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Local\Temp\data\Codejock.SkinFramework.v12.0.2.ocx" /s2⤵PID:2824
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Local\Temp\data\MSCOMCTL.OCX" /s2⤵PID:2876
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Local\Temp\data\MSDATGRD.OCX" /s2⤵PID:2240
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Local\Temp\data\mswinsck.ocx" /s2⤵PID:2720
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Local\Temp\data\RICHTX32.OCX" /s2⤵PID:2752
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Local\Temp\data\MSINET.OCX" /s2⤵PID:2512
-