Analysis
-
max time kernel
168s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
785c92b829a465a993a718ca45a96662.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
785c92b829a465a993a718ca45a96662.exe
Resource
win10v2004-20231215-en
General
-
Target
785c92b829a465a993a718ca45a96662.exe
-
Size
95KB
-
MD5
785c92b829a465a993a718ca45a96662
-
SHA1
4c867b571a3b24d50bc8f20fa1848f8b882e2832
-
SHA256
77f5946d6788181cb7fd12a1ba87e8111e75474e3576dda0be2caf88d5311237
-
SHA512
516b43426b62210e81e5b693eba723e4ac9e79d6d199dda0ef97ab2c41dfdd445394ef978f0f7884545732bbdb182378d728d2b48a5c05fc030e329ef7894879
-
SSDEEP
1536:Ux7s8I36fuxgv/9hEx1ppIjbEo1/tkZwyDxyd3KNx6bWnToIfAIOgGx:A73Iqfv0CbEO/tTyFSKNx6OTBf2gGx
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 204.117.214.10 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2516 set thread context of 776 2516 785c92b829a465a993a718ca45a96662.exe 100 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2516 wrote to memory of 776 2516 785c92b829a465a993a718ca45a96662.exe 100 PID 2516 wrote to memory of 776 2516 785c92b829a465a993a718ca45a96662.exe 100 PID 2516 wrote to memory of 776 2516 785c92b829a465a993a718ca45a96662.exe 100 PID 2516 wrote to memory of 776 2516 785c92b829a465a993a718ca45a96662.exe 100 PID 2516 wrote to memory of 3332 2516 785c92b829a465a993a718ca45a96662.exe 99 PID 2516 wrote to memory of 3332 2516 785c92b829a465a993a718ca45a96662.exe 99 PID 2516 wrote to memory of 3332 2516 785c92b829a465a993a718ca45a96662.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\785c92b829a465a993a718ca45a96662.exe"C:\Users\Admin\AppData\Local\Temp\785c92b829a465a993a718ca45a96662.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\11993091.bat2⤵PID:3332
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:776
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5d954bb76e9cdd56f1f65c2b85b5ce559
SHA1ce7e7bfecb4613a25c1994cecd67f87ddc6ad46f
SHA2560a944704aaa25a40057fb9ebba3ec55559c845ceabaf9253caf569190853a3ac
SHA5122c064794da0d0dfe4bc4170b1df51ba362919bb6b16da8a4a02e0ba540bf8bafcfed544f04bdb5a8f72b022c10e31e149948a6a63498b0dfa62fc36105492027