Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
051b6f3c39d8696f8fcd23130a577d7f.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
051b6f3c39d8696f8fcd23130a577d7f.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
051b6f3c39d8696f8fcd23130a577d7f.exe
-
Size
58KB
-
MD5
051b6f3c39d8696f8fcd23130a577d7f
-
SHA1
e418d79a18f51b45197a1e0b608e8d9159c0e73d
-
SHA256
5e37da365fd3b6ba06283a977b9940d50c51ef66aac7bd20d1f2894cbe45f0fc
-
SHA512
a9141ed4566740176bf4e5abbd98e1f3af10aa0b4f99be5f09f907f736080676838e91f3274e4d6a1cbf3de898a1756f25053ec290e0ed597c30032031db9eb2
-
SSDEEP
1536:IgEnakJtmRLoPSzJDh2XEpP8eSVzJ80e2Xt9fK3ULZYu:9EXvmpxw0FHZ0TXlWu
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3000 set thread context of 3004 3000 051b6f3c39d8696f8fcd23130a577d7f.exe 16 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3004 3000 051b6f3c39d8696f8fcd23130a577d7f.exe 16 PID 3000 wrote to memory of 3004 3000 051b6f3c39d8696f8fcd23130a577d7f.exe 16 PID 3000 wrote to memory of 3004 3000 051b6f3c39d8696f8fcd23130a577d7f.exe 16 PID 3000 wrote to memory of 3004 3000 051b6f3c39d8696f8fcd23130a577d7f.exe 16 PID 3000 wrote to memory of 3004 3000 051b6f3c39d8696f8fcd23130a577d7f.exe 16 PID 3000 wrote to memory of 3004 3000 051b6f3c39d8696f8fcd23130a577d7f.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\051b6f3c39d8696f8fcd23130a577d7f.exe"C:\Users\Admin\AppData\Local\Temp\051b6f3c39d8696f8fcd23130a577d7f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\051b6f3c39d8696f8fcd23130a577d7f.exe"C:\Users\Admin\AppData\Local\Temp\051b6f3c39d8696f8fcd23130a577d7f.exe"2⤵PID:3004
-