Analysis
-
max time kernel
91s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1a89ee0363a6076ca7cb36e0ded6bc3a.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a89ee0363a6076ca7cb36e0ded6bc3a.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
1a89ee0363a6076ca7cb36e0ded6bc3a.exe
-
Size
285KB
-
MD5
1a89ee0363a6076ca7cb36e0ded6bc3a
-
SHA1
284254bfb61af45172630d528d0712aecee0a89b
-
SHA256
59c7410eb2d853439dc2fc77d8dc25cf8f19ca5ce6d205035389c8d5dd7b636a
-
SHA512
28c77301cee73f01cfa584c3790f7420fa9a5da0b0d5369a9d4765aee55ade39b6706532d91aa65525a3d382ceb08cbc9a7f457e7ebe0fdde92104cd07fad8ed
-
SSDEEP
6144:cRXPmm2R2I5K3dGCw5lx2b4TyQOI5JgpcvqNplcg0px:QXPm32+Kd4x20T0Iw5pGpx
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4208 set thread context of 4036 4208 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 88 -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 1a89ee0363a6076ca7cb36e0ded6bc3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 1a89ee0363a6076ca7cb36e0ded6bc3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 1a89ee0363a6076ca7cb36e0ded6bc3a.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4036 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 4036 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 4036 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 4036 1a89ee0363a6076ca7cb36e0ded6bc3a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4208 1a89ee0363a6076ca7cb36e0ded6bc3a.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4208 wrote to memory of 4036 4208 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 88 PID 4208 wrote to memory of 4036 4208 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 88 PID 4208 wrote to memory of 4036 4208 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 88 PID 4208 wrote to memory of 4036 4208 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 88 PID 4208 wrote to memory of 4036 4208 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 88 PID 4208 wrote to memory of 4036 4208 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 88 PID 4208 wrote to memory of 4036 4208 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 88 PID 4036 wrote to memory of 3476 4036 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 57 PID 4036 wrote to memory of 3476 4036 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 57 PID 4036 wrote to memory of 3476 4036 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 57 PID 4036 wrote to memory of 3476 4036 1a89ee0363a6076ca7cb36e0ded6bc3a.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\1a89ee0363a6076ca7cb36e0ded6bc3a.exe"C:\Users\Admin\AppData\Local\Temp\1a89ee0363a6076ca7cb36e0ded6bc3a.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\1a89ee0363a6076ca7cb36e0ded6bc3a.exe"C:\Users\Admin\AppData\Local\Temp\1a89ee0363a6076ca7cb36e0ded6bc3a.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4036
-
-