Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 08:12
Static task
static1
Behavioral task
behavioral1
Sample
11344325b0e0126f35b170fc2fbaa4bc.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
11344325b0e0126f35b170fc2fbaa4bc.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
11344325b0e0126f35b170fc2fbaa4bc.exe
-
Size
606KB
-
MD5
11344325b0e0126f35b170fc2fbaa4bc
-
SHA1
2170ede9f08ef2abf1d669b8bc5d8c978aaa1b4d
-
SHA256
10a176f12611bbbf211c82cf674883527f981028e12234b82819073b1244d95b
-
SHA512
e5382a4f8ef9392b8f6abbf5feec517e943b2d804d87fe0bced87943f7fbd02d6350f760ee3c990e4433219fab2f41ffd33b604f0d3f7d8d55bb8afb2fcc2b68
-
SSDEEP
12288:v7vgHZvpwJWlYI3u4uy/ouC8SLneo6NjMrk:Lg5xU23u4UgSzZ6ik
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2156 11344325b0e0126f35b170fc2fbaa4bc.exe 2324 11344325b0e0126f35b170fc2fbaa4bc.exe 2332 11344325b0e0126f35b170fc2fbaa4bc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2324 2156 11344325b0e0126f35b170fc2fbaa4bc.exe 29 PID 2156 wrote to memory of 2324 2156 11344325b0e0126f35b170fc2fbaa4bc.exe 29 PID 2156 wrote to memory of 2324 2156 11344325b0e0126f35b170fc2fbaa4bc.exe 29 PID 2156 wrote to memory of 2324 2156 11344325b0e0126f35b170fc2fbaa4bc.exe 29 PID 2156 wrote to memory of 2332 2156 11344325b0e0126f35b170fc2fbaa4bc.exe 28 PID 2156 wrote to memory of 2332 2156 11344325b0e0126f35b170fc2fbaa4bc.exe 28 PID 2156 wrote to memory of 2332 2156 11344325b0e0126f35b170fc2fbaa4bc.exe 28 PID 2156 wrote to memory of 2332 2156 11344325b0e0126f35b170fc2fbaa4bc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\11344325b0e0126f35b170fc2fbaa4bc.exe"C:\Users\Admin\AppData\Local\Temp\11344325b0e0126f35b170fc2fbaa4bc.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\11344325b0e0126f35b170fc2fbaa4bc.exewatch2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\11344325b0e0126f35b170fc2fbaa4bc.exestart2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2324
-