Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ce20695a046d0aed64f1fb1e0c83d22.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7ce20695a046d0aed64f1fb1e0c83d22.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
7ce20695a046d0aed64f1fb1e0c83d22.exe
-
Size
592KB
-
MD5
7ce20695a046d0aed64f1fb1e0c83d22
-
SHA1
5595c9c81e90ac320d6c90da35c87a69743da69b
-
SHA256
9671aa55a34fcecf2291e8173a407782d113f40f74b002ac3c02c89f0b04b454
-
SHA512
494e4af7d9c384879e202850418d7a045b8419ae9967527b6410f20b30a97b61dca8304e4f14e6090bcda11216056dc6faa8b12bec4c76c9688faaf64227fe74
-
SSDEEP
3072:4Fb5LlM11Gvbec1YdRmbh8f4TCsKp9hJm/KzopkhUrloBLCWZ1wK/+70uCYpd4R/:oec8mbajsKdJ6KzopzrloR9wK/oyRDh
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1340 set thread context of 2292 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2292 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe 28 PID 1340 wrote to memory of 2292 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe 28 PID 1340 wrote to memory of 2292 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe 28 PID 1340 wrote to memory of 2292 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe 28 PID 1340 wrote to memory of 2292 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe 28 PID 1340 wrote to memory of 2292 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe 28 PID 1340 wrote to memory of 2292 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe 28 PID 1340 wrote to memory of 2292 1340 7ce20695a046d0aed64f1fb1e0c83d22.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ce20695a046d0aed64f1fb1e0c83d22.exe"C:\Users\Admin\AppData\Local\Temp\7ce20695a046d0aed64f1fb1e0c83d22.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\7ce20695a046d0aed64f1fb1e0c83d22.exeC:\Users\Admin\AppData\Local\Temp\7ce20695a046d0aed64f1fb1e0c83d22.exe2⤵PID:2292
-