Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 15:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
298481771c1a80b4ca7c76ee88a019d1.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
298481771c1a80b4ca7c76ee88a019d1.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
298481771c1a80b4ca7c76ee88a019d1.exe
-
Size
212KB
-
MD5
298481771c1a80b4ca7c76ee88a019d1
-
SHA1
0dd51347fa1fdf209af04bcbdf2d8bd98bb3128c
-
SHA256
45c94e2aeecb18722af875f9af40c97ad1e85065c6389b3b3084216022b8ae26
-
SHA512
5f68abad093f7adcde3592da72cd326cc8beafa669d4333271911a351f35c058bded4d4b4fc1b082304f7764db22605924b68575a657629649e8d15361043b33
-
SSDEEP
3072:5pPJhXGWGPp+iDrUGVlspIq+rCjeWod4RCAea9Pzrc77OWw8x8cehKR3ZNr:LxoWGPpjVC2q+dGMCc769/cAGP
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 2412 2360 298481771c1a80b4ca7c76ee88a019d1.exe 28 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 298481771c1a80b4ca7c76ee88a019d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 298481771c1a80b4ca7c76ee88a019d1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2412 298481771c1a80b4ca7c76ee88a019d1.exe 2412 298481771c1a80b4ca7c76ee88a019d1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2360 298481771c1a80b4ca7c76ee88a019d1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2412 2360 298481771c1a80b4ca7c76ee88a019d1.exe 28 PID 2360 wrote to memory of 2412 2360 298481771c1a80b4ca7c76ee88a019d1.exe 28 PID 2360 wrote to memory of 2412 2360 298481771c1a80b4ca7c76ee88a019d1.exe 28 PID 2360 wrote to memory of 2412 2360 298481771c1a80b4ca7c76ee88a019d1.exe 28 PID 2360 wrote to memory of 2412 2360 298481771c1a80b4ca7c76ee88a019d1.exe 28 PID 2360 wrote to memory of 2412 2360 298481771c1a80b4ca7c76ee88a019d1.exe 28 PID 2360 wrote to memory of 2412 2360 298481771c1a80b4ca7c76ee88a019d1.exe 28 PID 2360 wrote to memory of 2412 2360 298481771c1a80b4ca7c76ee88a019d1.exe 28 PID 2412 wrote to memory of 1196 2412 298481771c1a80b4ca7c76ee88a019d1.exe 21 PID 2412 wrote to memory of 1196 2412 298481771c1a80b4ca7c76ee88a019d1.exe 21 PID 2412 wrote to memory of 1196 2412 298481771c1a80b4ca7c76ee88a019d1.exe 21 PID 2412 wrote to memory of 1196 2412 298481771c1a80b4ca7c76ee88a019d1.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\298481771c1a80b4ca7c76ee88a019d1.exe"C:\Users\Admin\AppData\Local\Temp\298481771c1a80b4ca7c76ee88a019d1.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\298481771c1a80b4ca7c76ee88a019d1.exeC:\Users\Admin\AppData\Local\Temp\298481771c1a80b4ca7c76ee88a019d1.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412
-
-