Analysis
-
max time kernel
186s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
15d66ed979af721cb0651c2248dad876.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15d66ed979af721cb0651c2248dad876.exe
Resource
win10v2004-20231215-en
General
-
Target
15d66ed979af721cb0651c2248dad876.exe
-
Size
5.8MB
-
MD5
15d66ed979af721cb0651c2248dad876
-
SHA1
06e61596d7b1e3cb575ecb0f8b702371388f9c82
-
SHA256
86a174b0d662ddea1f0b5324e0b5cb91fc058734105e336396ab88b9d8e5b242
-
SHA512
e11e8ee8b604b76da973b97c6c26979c20a9b941b14331ff14b839c25f3049f45e6d6c402cb2a7d9dcf26212f7d9c3a9fe1890ab93c4a5812398ffaaff862031
-
SSDEEP
49152:bzeo6U+YJJbce5QSb0wtxmH7aCDoD1rTrWvKYgbsT4AvCB7Jcyq/FBGS26iK+V5D:bzeoDRJ/WoD1rH1/nlpsuaZXK6M
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4640 set thread context of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4280 15d66ed979af721cb0651c2248dad876.exe 4280 15d66ed979af721cb0651c2248dad876.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4280 15d66ed979af721cb0651c2248dad876.exe 4280 15d66ed979af721cb0651c2248dad876.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94 PID 4640 wrote to memory of 4280 4640 15d66ed979af721cb0651c2248dad876.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d66ed979af721cb0651c2248dad876.exe"C:\Users\Admin\AppData\Local\Temp\15d66ed979af721cb0651c2248dad876.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\15d66ed979af721cb0651c2248dad876.exe"C:\Users\Admin\AppData\Local\Temp\15d66ed979af721cb0651c2248dad876.exe" ""2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4280
-