Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 17:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7f1cd0f74dafe272767c64bbccf6d3e4.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
7f1cd0f74dafe272767c64bbccf6d3e4.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
7f1cd0f74dafe272767c64bbccf6d3e4.exe
-
Size
44KB
-
MD5
7f1cd0f74dafe272767c64bbccf6d3e4
-
SHA1
798bc72b24de862250c253e6d6ad0feac406347f
-
SHA256
75fd33c51d2d1813aeeabc0b3c50b4e14b7909e23ab9c751d9df9fbe6eb0c4ef
-
SHA512
72f0330c107ac9c184ee7c804e424e3a6db6de686e5e551c57d9098051344bb5b507d3ea975b03426882260c4c320a3fa9194d22db700224d98a09210da20929
-
SSDEEP
384:CtoFSZ28yYrmvbsPM3hQvtdd5+umc6k8la30/qvgENJpi1zdW1yp:Ct6SZ8YrmTP3hatdnQhkfkS1NXi1zdu
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2532 svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\systi.exe svchost.exe File opened for modification C:\Windows\SysWOW64\systi.exe svchost.exe File created C:\Windows\SysWOW64\svchy74.dll svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2928 set thread context of 2532 2928 7f1cd0f74dafe272767c64bbccf6d3e4.exe 28 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2532 2928 7f1cd0f74dafe272767c64bbccf6d3e4.exe 28 PID 2928 wrote to memory of 2532 2928 7f1cd0f74dafe272767c64bbccf6d3e4.exe 28 PID 2928 wrote to memory of 2532 2928 7f1cd0f74dafe272767c64bbccf6d3e4.exe 28 PID 2928 wrote to memory of 2532 2928 7f1cd0f74dafe272767c64bbccf6d3e4.exe 28 PID 2928 wrote to memory of 2532 2928 7f1cd0f74dafe272767c64bbccf6d3e4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f1cd0f74dafe272767c64bbccf6d3e4.exe"C:\Users\Admin\AppData\Local\Temp\7f1cd0f74dafe272767c64bbccf6d3e4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Drops file in System32 directory
PID:2532
-