Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 07:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ec18603df155c632418bcf14475df93.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ec18603df155c632418bcf14475df93.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
0ec18603df155c632418bcf14475df93.exe
-
Size
80KB
-
MD5
0ec18603df155c632418bcf14475df93
-
SHA1
f6d72e2edc130b5c313108afa6ffe7a5e5ccd254
-
SHA256
e402dc981dfd65785ba438b5a411e79113011cfe106de67070a5bbb79791eae8
-
SHA512
e23b0ca88ad1dc6e7e6f30a59c4f43a614c852ec9c1815c4a29975b5cfcfa1c787a56176611ab665c38e2f3c7e31c3e5790ca849c5f647db88252e85d6eec35c
-
SSDEEP
1536:RV6AagumBNEmkbFGSTCSjU9Fhtu3eGORR2XxxyT42meitOe32QOA:RC8BNgbAylQAeeH23itl32Qr
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2076 set thread context of 2220 2076 0ec18603df155c632418bcf14475df93.exe 16 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2076 0ec18603df155c632418bcf14475df93.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2220 2076 0ec18603df155c632418bcf14475df93.exe 16 PID 2076 wrote to memory of 2220 2076 0ec18603df155c632418bcf14475df93.exe 16 PID 2076 wrote to memory of 2220 2076 0ec18603df155c632418bcf14475df93.exe 16 PID 2076 wrote to memory of 2220 2076 0ec18603df155c632418bcf14475df93.exe 16 PID 2076 wrote to memory of 2220 2076 0ec18603df155c632418bcf14475df93.exe 16 PID 2076 wrote to memory of 2220 2076 0ec18603df155c632418bcf14475df93.exe 16 PID 2076 wrote to memory of 2220 2076 0ec18603df155c632418bcf14475df93.exe 16 PID 2076 wrote to memory of 2220 2076 0ec18603df155c632418bcf14475df93.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ec18603df155c632418bcf14475df93.exe"C:\Users\Admin\AppData\Local\Temp\0ec18603df155c632418bcf14475df93.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\0ec18603df155c632418bcf14475df93.exe"C:\Users\Admin\AppData\Local\Temp\0ec18603df155c632418bcf14475df93.exe"2⤵PID:2220
-