Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4586484469a61acff86af04c979d74ff.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4586484469a61acff86af04c979d74ff.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
4586484469a61acff86af04c979d74ff.exe
-
Size
65KB
-
MD5
4586484469a61acff86af04c979d74ff
-
SHA1
06eb3b82c53b072ba6a16d1a5a2a2eed85d581ba
-
SHA256
558dfef0d4632e3a042fe939f13f2827ecf4110a86b0f5a56b9edd30329458de
-
SHA512
fbaf2304be0d9756f9da1e8784967ad2ed401b0ae3abe921903d9d5818f0e0763c42bfb7e8e84a870352f554705a5b0683c656d0ee224c45fe377cdd4b69c92b
-
SSDEEP
768:CEMN+t65Z3k9wVfV7uqGdFfw/i8aopIZbFOpv6K45uoyz8YpUVj8AhjN:CNN+M5Z30GflOvfkrEFOku5j+
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dttod9y0.exe 4586484469a61acff86af04c979d74ff.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dttod9y0.exe 4586484469a61acff86af04c979d74ff.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1924 set thread context of 2172 1924 4586484469a61acff86af04c979d74ff.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2172 4586484469a61acff86af04c979d74ff.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2172 1924 4586484469a61acff86af04c979d74ff.exe 28 PID 1924 wrote to memory of 2172 1924 4586484469a61acff86af04c979d74ff.exe 28 PID 1924 wrote to memory of 2172 1924 4586484469a61acff86af04c979d74ff.exe 28 PID 1924 wrote to memory of 2172 1924 4586484469a61acff86af04c979d74ff.exe 28 PID 1924 wrote to memory of 2172 1924 4586484469a61acff86af04c979d74ff.exe 28 PID 1924 wrote to memory of 2172 1924 4586484469a61acff86af04c979d74ff.exe 28 PID 2172 wrote to memory of 1284 2172 4586484469a61acff86af04c979d74ff.exe 7 PID 2172 wrote to memory of 1284 2172 4586484469a61acff86af04c979d74ff.exe 7 PID 2172 wrote to memory of 1284 2172 4586484469a61acff86af04c979d74ff.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\4586484469a61acff86af04c979d74ff.exe"C:\Users\Admin\AppData\Local\Temp\4586484469a61acff86af04c979d74ff.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\4586484469a61acff86af04c979d74ff.exe"C:\Users\Admin\AppData\Local\Temp\4586484469a61acff86af04c979d74ff.exe"2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284