Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 23:51
Behavioral task
behavioral1
Sample
0793e14c75d527b4b566ddf3c21c4a83.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0793e14c75d527b4b566ddf3c21c4a83.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
0793e14c75d527b4b566ddf3c21c4a83.exe
-
Size
116KB
-
MD5
0793e14c75d527b4b566ddf3c21c4a83
-
SHA1
9e6a098df8dae03403fd14f47b869cf3d7661eb9
-
SHA256
02dea1acab3b2688df53446c8f16e8e885aabaee578bd13453cd6365214f4bf0
-
SHA512
7d170ebc68b80d6876c2efe6e23e443386c2427d8a2dd8da5caba145a07a7806bc1e67a64e8af094ffd86393f6df7be6d98b515903227ca7a0f7700c1c446ccf
-
SSDEEP
3072:pIa5AZqZTlPqhrEKUpTSCRVYFyQlYZPx/qaCjZAYp:pL52yPqdClyFdWldqRAYp
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2880-0-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2880-3-0x0000000000250000-0x0000000000293000-memory.dmp upx behavioral1/memory/2880-8-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2880 set thread context of 2736 2880 0793e14c75d527b4b566ddf3c21c4a83.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2736 0793e14c75d527b4b566ddf3c21c4a83.exe 2736 0793e14c75d527b4b566ddf3c21c4a83.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2880 0793e14c75d527b4b566ddf3c21c4a83.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2736 2880 0793e14c75d527b4b566ddf3c21c4a83.exe 30 PID 2880 wrote to memory of 2736 2880 0793e14c75d527b4b566ddf3c21c4a83.exe 30 PID 2880 wrote to memory of 2736 2880 0793e14c75d527b4b566ddf3c21c4a83.exe 30 PID 2880 wrote to memory of 2736 2880 0793e14c75d527b4b566ddf3c21c4a83.exe 30 PID 2880 wrote to memory of 2736 2880 0793e14c75d527b4b566ddf3c21c4a83.exe 30 PID 2880 wrote to memory of 2736 2880 0793e14c75d527b4b566ddf3c21c4a83.exe 30 PID 2880 wrote to memory of 2736 2880 0793e14c75d527b4b566ddf3c21c4a83.exe 30 PID 2880 wrote to memory of 2736 2880 0793e14c75d527b4b566ddf3c21c4a83.exe 30 PID 2736 wrote to memory of 1260 2736 0793e14c75d527b4b566ddf3c21c4a83.exe 9 PID 2736 wrote to memory of 1260 2736 0793e14c75d527b4b566ddf3c21c4a83.exe 9 PID 2736 wrote to memory of 1260 2736 0793e14c75d527b4b566ddf3c21c4a83.exe 9 PID 2736 wrote to memory of 1260 2736 0793e14c75d527b4b566ddf3c21c4a83.exe 9
Processes
-
C:\Users\Admin\AppData\Local\Temp\0793e14c75d527b4b566ddf3c21c4a83.exe"C:\Users\Admin\AppData\Local\Temp\0793e14c75d527b4b566ddf3c21c4a83.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\0793e14c75d527b4b566ddf3c21c4a83.exeC:\Users\Admin\AppData\Local\Temp\0793e14c75d527b4b566ddf3c21c4a83.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260