Analysis
-
max time kernel
97s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:33
Behavioral task
behavioral1
Sample
177e618f1da0ae24c283229d8a145e3f.exe
Resource
win7-20231215-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
177e618f1da0ae24c283229d8a145e3f.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
177e618f1da0ae24c283229d8a145e3f.exe
-
Size
204KB
-
MD5
177e618f1da0ae24c283229d8a145e3f
-
SHA1
86e14ac9cb5b5a071893b6a6f69754968cbae7d0
-
SHA256
25eaee138ea5daa22159b2536e4bd2c313351e424113ee8b045e0f1042398913
-
SHA512
5949341a77aea50a8d39a9724deae64ee5be7f576fb08ca9ed58c2572bffcb254681cd953cbc853dced30f3361e93fd204efcdfec03f0c946613d55cdd069b5d
-
SSDEEP
6144:OS/ryv8VsRKPe/AaOEStScBxxe1mBDzr3E:t/rC8VSQHBO1u/r3E
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2648-0-0x0000000000400000-0x0000000000447C00-memory.dmp upx behavioral2/memory/2648-6-0x0000000000400000-0x0000000000447C00-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2648 set thread context of 2272 2648 177e618f1da0ae24c283229d8a145e3f.exe 31 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2272 177e618f1da0ae24c283229d8a145e3f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2648 177e618f1da0ae24c283229d8a145e3f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2272 2648 177e618f1da0ae24c283229d8a145e3f.exe 31 PID 2648 wrote to memory of 2272 2648 177e618f1da0ae24c283229d8a145e3f.exe 31 PID 2648 wrote to memory of 2272 2648 177e618f1da0ae24c283229d8a145e3f.exe 31 PID 2648 wrote to memory of 2272 2648 177e618f1da0ae24c283229d8a145e3f.exe 31 PID 2648 wrote to memory of 2272 2648 177e618f1da0ae24c283229d8a145e3f.exe 31 PID 2648 wrote to memory of 2272 2648 177e618f1da0ae24c283229d8a145e3f.exe 31 PID 2648 wrote to memory of 2272 2648 177e618f1da0ae24c283229d8a145e3f.exe 31 PID 2648 wrote to memory of 2272 2648 177e618f1da0ae24c283229d8a145e3f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\177e618f1da0ae24c283229d8a145e3f.exe"C:\Users\Admin\AppData\Local\Temp\177e618f1da0ae24c283229d8a145e3f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\177e618f1da0ae24c283229d8a145e3f.exe"C:\Users\Admin\AppData\Local\Temp\177e618f1da0ae24c283229d8a145e3f.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2272
-