Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 18:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
35afcf29afedbc371e446aaed65de901.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
35afcf29afedbc371e446aaed65de901.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
35afcf29afedbc371e446aaed65de901.exe
-
Size
182KB
-
MD5
35afcf29afedbc371e446aaed65de901
-
SHA1
54493d831985f569947e43cfc0bf952969860eb2
-
SHA256
6fbd2934f653f5085f7ae0b974f11673494f076770e28f6e9b7e1867d783a06b
-
SHA512
57d67f8f4aebe5a5178d5ae2e9318cb05f1c2d3c97b04c3a63b5ddac80f51228cf88991371cd94e1832d30aea684f2ac07bb11b5f88ce8da7645cb321dc6d648
-
SSDEEP
3072:3HMAmgoqaNU1LiOyzb0qkVoDiYE2/+S5io/Hw3a5YHG3Pzrc77OWw8x8cj:3HbaNQG4qkVoDiB22B2Hw3alXc769/cj
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2040 set thread context of 2924 2040 35afcf29afedbc371e446aaed65de901.exe 14 PID 2040 set thread context of 0 2040 35afcf29afedbc371e446aaed65de901.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 35afcf29afedbc371e446aaed65de901.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 35afcf29afedbc371e446aaed65de901.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2924 35afcf29afedbc371e446aaed65de901.exe 2924 35afcf29afedbc371e446aaed65de901.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2040 35afcf29afedbc371e446aaed65de901.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2924 2040 35afcf29afedbc371e446aaed65de901.exe 14 PID 2040 wrote to memory of 2924 2040 35afcf29afedbc371e446aaed65de901.exe 14 PID 2040 wrote to memory of 2924 2040 35afcf29afedbc371e446aaed65de901.exe 14 PID 2040 wrote to memory of 2924 2040 35afcf29afedbc371e446aaed65de901.exe 14 PID 2040 wrote to memory of 2924 2040 35afcf29afedbc371e446aaed65de901.exe 14 PID 2040 wrote to memory of 2924 2040 35afcf29afedbc371e446aaed65de901.exe 14 PID 2040 wrote to memory of 2924 2040 35afcf29afedbc371e446aaed65de901.exe 14 PID 2040 wrote to memory of 2924 2040 35afcf29afedbc371e446aaed65de901.exe 14 PID 2040 wrote to memory of 0 2040 35afcf29afedbc371e446aaed65de901.exe PID 2040 wrote to memory of 0 2040 35afcf29afedbc371e446aaed65de901.exe PID 2040 wrote to memory of 0 2040 35afcf29afedbc371e446aaed65de901.exe PID 2040 wrote to memory of 0 2040 35afcf29afedbc371e446aaed65de901.exe PID 2924 wrote to memory of 1328 2924 35afcf29afedbc371e446aaed65de901.exe 11 PID 2924 wrote to memory of 1328 2924 35afcf29afedbc371e446aaed65de901.exe 11 PID 2924 wrote to memory of 1328 2924 35afcf29afedbc371e446aaed65de901.exe 11 PID 2924 wrote to memory of 1328 2924 35afcf29afedbc371e446aaed65de901.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\35afcf29afedbc371e446aaed65de901.exe"C:\Users\Admin\AppData\Local\Temp\35afcf29afedbc371e446aaed65de901.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\35afcf29afedbc371e446aaed65de901.exe"C:\Users\Admin\AppData\Local\Temp\35afcf29afedbc371e446aaed65de901.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924