Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
2ec84c7f64eb5fc8d2f19d5f39a81528.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ec84c7f64eb5fc8d2f19d5f39a81528.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
2ec84c7f64eb5fc8d2f19d5f39a81528.exe
-
Size
1.3MB
-
MD5
2ec84c7f64eb5fc8d2f19d5f39a81528
-
SHA1
8a8b58ca7a5b20a17c9bd5954345b8fa1d2aa389
-
SHA256
2028db8966934bf9df329178f82cf4b73efbd766ce5c89fd239551a5f7277cfb
-
SHA512
418fa81f5a31d89562ab810164266ef391b9490ba752a85d3151c3941369336854f9c651ea16a05c6ea220c16fce939e1ce54777342367e7cce90e6ae72d2d2f
-
SSDEEP
24576:dpyhP5RFFrSEyFPu8JR9ksaQFCLwbLflBPb:ayFPu8D9k5QELuLz
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2852 set thread context of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 2ec84c7f64eb5fc8d2f19d5f39a81528.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2860 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 2860 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 2860 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 2860 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 2860 2ec84c7f64eb5fc8d2f19d5f39a81528.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17 PID 2852 wrote to memory of 2860 2852 2ec84c7f64eb5fc8d2f19d5f39a81528.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ec84c7f64eb5fc8d2f19d5f39a81528.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
C:\Users\Admin\AppData\Local\Temp\2ec84c7f64eb5fc8d2f19d5f39a81528.exe"C:\Users\Admin\AppData\Local\Temp\2ec84c7f64eb5fc8d2f19d5f39a81528.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2852