Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 18:15
Static task
static1
Behavioral task
behavioral1
Sample
33c791c825b95c3a368598e4021ce4cc.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
33c791c825b95c3a368598e4021ce4cc.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
33c791c825b95c3a368598e4021ce4cc.exe
-
Size
598KB
-
MD5
33c791c825b95c3a368598e4021ce4cc
-
SHA1
d30da82f169b0030a843cad49bfd95bd97b38cc4
-
SHA256
1577287922a1b08645cf00e9f4c9f0ccfa142810b544de2c9783fbe057ae59cf
-
SHA512
d72d6530ae6d89c9ac55e579e3a383a8ce9b31a1347de7363447632667e343ca6dc56bc1baf13c6a12171f678c17e10aaa2f03db17dad9d3a264b3592ed4980d
-
SSDEEP
12288:SezSFTOrj+5uCcAWkO0NV5RXn1oK0w/Mh:yTOrLB0rXGK0w2
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1768 33c791c825b95c3a368598e4021ce4cc.exe 1264 33c791c825b95c3a368598e4021ce4cc.exe 3056 33c791c825b95c3a368598e4021ce4cc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1264 1768 33c791c825b95c3a368598e4021ce4cc.exe 29 PID 1768 wrote to memory of 1264 1768 33c791c825b95c3a368598e4021ce4cc.exe 29 PID 1768 wrote to memory of 1264 1768 33c791c825b95c3a368598e4021ce4cc.exe 29 PID 1768 wrote to memory of 1264 1768 33c791c825b95c3a368598e4021ce4cc.exe 29 PID 1768 wrote to memory of 3056 1768 33c791c825b95c3a368598e4021ce4cc.exe 28 PID 1768 wrote to memory of 3056 1768 33c791c825b95c3a368598e4021ce4cc.exe 28 PID 1768 wrote to memory of 3056 1768 33c791c825b95c3a368598e4021ce4cc.exe 28 PID 1768 wrote to memory of 3056 1768 33c791c825b95c3a368598e4021ce4cc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\33c791c825b95c3a368598e4021ce4cc.exe"C:\Users\Admin\AppData\Local\Temp\33c791c825b95c3a368598e4021ce4cc.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\33c791c825b95c3a368598e4021ce4cc.exewatch2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\33c791c825b95c3a368598e4021ce4cc.exestart2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1264
-