Analysis
-
max time kernel
147s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 20:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3adbef82f723292079ae60173f2d6cf3.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3adbef82f723292079ae60173f2d6cf3.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
3adbef82f723292079ae60173f2d6cf3.exe
-
Size
273KB
-
MD5
3adbef82f723292079ae60173f2d6cf3
-
SHA1
853db39ecdb74c451d52a2b0c65519fdf178226e
-
SHA256
4ab697074e9a791aa4c93c15477f7c54b80c9041aa9152260203384d60e0f909
-
SHA512
3bd15068f3d703cbe5a0084811771a8e82a6fd9c386f9c6456bdfda70681524707412534445e96c4849d2b6eb3678891d122068e83c2cbb21a29b3413b62a035
-
SSDEEP
6144:pvGd72w2Ub4S3l+4OCdyOfRLQ3Z9MUa6:pv0ntZ3lgC0OflQJ
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3680 set thread context of 216 3680 3adbef82f723292079ae60173f2d6cf3.exe 29 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3680 3adbef82f723292079ae60173f2d6cf3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3680 wrote to memory of 216 3680 3adbef82f723292079ae60173f2d6cf3.exe 29 PID 3680 wrote to memory of 216 3680 3adbef82f723292079ae60173f2d6cf3.exe 29 PID 3680 wrote to memory of 216 3680 3adbef82f723292079ae60173f2d6cf3.exe 29 PID 3680 wrote to memory of 216 3680 3adbef82f723292079ae60173f2d6cf3.exe 29 PID 3680 wrote to memory of 216 3680 3adbef82f723292079ae60173f2d6cf3.exe 29 PID 3680 wrote to memory of 216 3680 3adbef82f723292079ae60173f2d6cf3.exe 29 PID 3680 wrote to memory of 216 3680 3adbef82f723292079ae60173f2d6cf3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3adbef82f723292079ae60173f2d6cf3.exe"C:\Users\Admin\AppData\Local\Temp\3adbef82f723292079ae60173f2d6cf3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\3adbef82f723292079ae60173f2d6cf3.exeC:\Users\Admin\AppData\Local\Temp\3adbef82f723292079ae60173f2d6cf3.exe2⤵PID:216
-