Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 11:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1a4cfd9b425903efc0d864eff8a94184.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a4cfd9b425903efc0d864eff8a94184.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
1a4cfd9b425903efc0d864eff8a94184.exe
-
Size
68KB
-
MD5
1a4cfd9b425903efc0d864eff8a94184
-
SHA1
a09b8c9badf4256ac2aef959e7c04782a5570ab9
-
SHA256
6576651e7c47f15954847f5140c00ea74d99632a87e1e4b54d245f028dab61b1
-
SHA512
b6778e0aced9fa2bb332eb1f770ceaaa1dc5c16c498b338f58c57dd45fbd53bb2b721750ffc929f9e9313ff8255a54fedc461055e1bcdb74c24f3158ebf91da3
-
SSDEEP
768:V0kIchnndZQefxpeMwd1Jg5YRwWLBPJpXSKgLBPJpXj:mkIc1ndZQefYlg5KwWVBpXSKgVBpXj
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1864 set thread context of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1864 1a4cfd9b425903efc0d864eff8a94184.exe 2056 1a4cfd9b425903efc0d864eff8a94184.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28 PID 1864 wrote to memory of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28 PID 1864 wrote to memory of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28 PID 1864 wrote to memory of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28 PID 1864 wrote to memory of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28 PID 1864 wrote to memory of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28 PID 1864 wrote to memory of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28 PID 1864 wrote to memory of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28 PID 1864 wrote to memory of 2056 1864 1a4cfd9b425903efc0d864eff8a94184.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a4cfd9b425903efc0d864eff8a94184.exe"C:\Users\Admin\AppData\Local\Temp\1a4cfd9b425903efc0d864eff8a94184.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\1a4cfd9b425903efc0d864eff8a94184.exe
- Suspicious use of SetWindowsHookEx
PID:2056
-