Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7986761c4143d125e67d931d6804d68f.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7986761c4143d125e67d931d6804d68f.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
7986761c4143d125e67d931d6804d68f.exe
-
Size
464KB
-
MD5
7986761c4143d125e67d931d6804d68f
-
SHA1
fe4908fdd841705a339e126dea84e22d976b3aab
-
SHA256
233cba6459f76f2a559e87b4833a8e4d48434bc467d8d71f0111e7061206c51e
-
SHA512
bc4ae852b5b7455927b6a4a1d8975b59ed01b504c67c8b713567e76103b276f751f79d5e66a45a2584c51842e302ed5d680cf8ee44f7595417fc3e7789cf8804
-
SSDEEP
6144:mZwXZwxEZwMuHgaN8ONBY3rNM5mvtlTMdDZwz:mipQHD8ONO3rO5KsA
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 532 2036 7986761c4143d125e67d931d6804d68f.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 532 7986761c4143d125e67d931d6804d68f.exe 532 7986761c4143d125e67d931d6804d68f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 7986761c4143d125e67d931d6804d68f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2036 wrote to memory of 532 2036 7986761c4143d125e67d931d6804d68f.exe 28 PID 2036 wrote to memory of 532 2036 7986761c4143d125e67d931d6804d68f.exe 28 PID 2036 wrote to memory of 532 2036 7986761c4143d125e67d931d6804d68f.exe 28 PID 2036 wrote to memory of 532 2036 7986761c4143d125e67d931d6804d68f.exe 28 PID 2036 wrote to memory of 532 2036 7986761c4143d125e67d931d6804d68f.exe 28 PID 2036 wrote to memory of 532 2036 7986761c4143d125e67d931d6804d68f.exe 28 PID 2036 wrote to memory of 532 2036 7986761c4143d125e67d931d6804d68f.exe 28 PID 2036 wrote to memory of 532 2036 7986761c4143d125e67d931d6804d68f.exe 28 PID 532 wrote to memory of 1232 532 7986761c4143d125e67d931d6804d68f.exe 18 PID 532 wrote to memory of 1232 532 7986761c4143d125e67d931d6804d68f.exe 18 PID 532 wrote to memory of 1232 532 7986761c4143d125e67d931d6804d68f.exe 18 PID 532 wrote to memory of 1232 532 7986761c4143d125e67d931d6804d68f.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\7986761c4143d125e67d931d6804d68f.exe"C:\Users\Admin\AppData\Local\Temp\7986761c4143d125e67d931d6804d68f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\7986761c4143d125e67d931d6804d68f.exe"C:\Users\Admin\AppData\Local\Temp\7986761c4143d125e67d931d6804d68f.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:532
-
-