Analysis
-
max time kernel
65s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2875cc7f4c23effe9ec18b81352802de.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2875cc7f4c23effe9ec18b81352802de.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
2875cc7f4c23effe9ec18b81352802de.exe
-
Size
57KB
-
MD5
2875cc7f4c23effe9ec18b81352802de
-
SHA1
c8284153a21422908fd33400cd9a50eb4e54754f
-
SHA256
5ef4670ff029d327ad167b4e8ee736ea41508a81473547273cb628646414975e
-
SHA512
af25b5666c7740ce7024e9489301cbeb224fcdf3b00e8f14db73070e8fc5e18846ed92d89200a7327a2424bc8e484fcb8e42a4694a1989a261eadfc42b2a5c08
-
SSDEEP
768:jCN+GgZf0nQrzYOAcSLWR7bkzLN0Ps7jFKvvvvWlogagHWXoiVjCzoX7qI5RF7mV:Xd8nQr0OhBRszLN5JtWXooIoXug7m0+d
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8ojzoee.exe 2875cc7f4c23effe9ec18b81352802de.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8ojzoee.exe 2875cc7f4c23effe9ec18b81352802de.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3024 set thread context of 2544 3024 2875cc7f4c23effe9ec18b81352802de.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2544 2875cc7f4c23effe9ec18b81352802de.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2544 3024 2875cc7f4c23effe9ec18b81352802de.exe 28 PID 3024 wrote to memory of 2544 3024 2875cc7f4c23effe9ec18b81352802de.exe 28 PID 3024 wrote to memory of 2544 3024 2875cc7f4c23effe9ec18b81352802de.exe 28 PID 3024 wrote to memory of 2544 3024 2875cc7f4c23effe9ec18b81352802de.exe 28 PID 3024 wrote to memory of 2544 3024 2875cc7f4c23effe9ec18b81352802de.exe 28 PID 3024 wrote to memory of 2544 3024 2875cc7f4c23effe9ec18b81352802de.exe 28 PID 2544 wrote to memory of 1244 2544 2875cc7f4c23effe9ec18b81352802de.exe 9 PID 2544 wrote to memory of 1244 2544 2875cc7f4c23effe9ec18b81352802de.exe 9 PID 2544 wrote to memory of 1244 2544 2875cc7f4c23effe9ec18b81352802de.exe 9
Processes
-
C:\Users\Admin\AppData\Local\Temp\2875cc7f4c23effe9ec18b81352802de.exe"C:\Users\Admin\AppData\Local\Temp\2875cc7f4c23effe9ec18b81352802de.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\2875cc7f4c23effe9ec18b81352802de.exe"C:\Users\Admin\AppData\Local\Temp\2875cc7f4c23effe9ec18b81352802de.exe"2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244