Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 11:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6a0dea5207894c149d4b64a63bdd0298.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6a0dea5207894c149d4b64a63bdd0298.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
6a0dea5207894c149d4b64a63bdd0298.exe
-
Size
112KB
-
MD5
6a0dea5207894c149d4b64a63bdd0298
-
SHA1
85f0fec7f808b5cce306a800e8c0353e9aa25dd2
-
SHA256
6ef9c94fd73a0beb8eebc6b4b09b3c37dc6c8c99b815fbb3d39ddb04b57eedef
-
SHA512
486f9292b87624a61061e85dd3a8d237309108dd0618bf950d7ea423456f73ff2396b88e6042f575a9d94700e1f395e1a73d77c5120c0cda231fcee3975e88cb
-
SSDEEP
3072:etGuBfd0yUYl06ZAlzB91zczKuPi5wUuaL0PUVNN:5auPIeua6U9LL
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2888 set thread context of 2784 2888 6a0dea5207894c149d4b64a63bdd0298.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2784 6a0dea5207894c149d4b64a63bdd0298.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2784 2888 6a0dea5207894c149d4b64a63bdd0298.exe 28 PID 2888 wrote to memory of 2784 2888 6a0dea5207894c149d4b64a63bdd0298.exe 28 PID 2888 wrote to memory of 2784 2888 6a0dea5207894c149d4b64a63bdd0298.exe 28 PID 2888 wrote to memory of 2784 2888 6a0dea5207894c149d4b64a63bdd0298.exe 28 PID 2888 wrote to memory of 2784 2888 6a0dea5207894c149d4b64a63bdd0298.exe 28 PID 2888 wrote to memory of 2784 2888 6a0dea5207894c149d4b64a63bdd0298.exe 28 PID 2784 wrote to memory of 1252 2784 6a0dea5207894c149d4b64a63bdd0298.exe 10 PID 2784 wrote to memory of 1252 2784 6a0dea5207894c149d4b64a63bdd0298.exe 10 PID 2784 wrote to memory of 1252 2784 6a0dea5207894c149d4b64a63bdd0298.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\6a0dea5207894c149d4b64a63bdd0298.exe"C:\Users\Admin\AppData\Local\Temp\6a0dea5207894c149d4b64a63bdd0298.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\6a0dea5207894c149d4b64a63bdd0298.exe"C:\Users\Admin\AppData\Local\Temp\6a0dea5207894c149d4b64a63bdd0298.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784
-
-