Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
034a87ae1b3c8856d075fd235db5a799.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
034a87ae1b3c8856d075fd235db5a799.exe
Resource
win10v2004-20231222-en
1 signatures
150 seconds
General
-
Target
034a87ae1b3c8856d075fd235db5a799.exe
-
Size
89KB
-
MD5
034a87ae1b3c8856d075fd235db5a799
-
SHA1
dc9371952d10833995f67c95b33ed7a4df5fb31e
-
SHA256
600593ebb267302d3436b8b17e80f49dfaa3595d36fb3bc70ca1c04a5d797bb8
-
SHA512
97a66957eddd9bb05373a499f2dabfce4eac4f81b8422ac907a3effaf7cadc8ad7dccafd0820832dac65c3ef8d0d99bce3cc3a9b1242257c746806a7d3477636
-
SSDEEP
768:WL3LzfkaLn2R8f+Rd4BDMVAaAF8tXID8wx8z+xSSJqM+fHfB68c8giIUq0YM7X:ybzRhNhFSYfsUnof/s8X3q0d7X
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5d6ooi2.exe 034a87ae1b3c8856d075fd235db5a799.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5d6ooi2.exe 034a87ae1b3c8856d075fd235db5a799.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2344 set thread context of 1676 2344 034a87ae1b3c8856d075fd235db5a799.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1676 034a87ae1b3c8856d075fd235db5a799.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1676 2344 034a87ae1b3c8856d075fd235db5a799.exe 28 PID 2344 wrote to memory of 1676 2344 034a87ae1b3c8856d075fd235db5a799.exe 28 PID 2344 wrote to memory of 1676 2344 034a87ae1b3c8856d075fd235db5a799.exe 28 PID 2344 wrote to memory of 1676 2344 034a87ae1b3c8856d075fd235db5a799.exe 28 PID 2344 wrote to memory of 1676 2344 034a87ae1b3c8856d075fd235db5a799.exe 28 PID 2344 wrote to memory of 1676 2344 034a87ae1b3c8856d075fd235db5a799.exe 28 PID 1676 wrote to memory of 1356 1676 034a87ae1b3c8856d075fd235db5a799.exe 22 PID 1676 wrote to memory of 1356 1676 034a87ae1b3c8856d075fd235db5a799.exe 22 PID 1676 wrote to memory of 1356 1676 034a87ae1b3c8856d075fd235db5a799.exe 22
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\034a87ae1b3c8856d075fd235db5a799.exe"C:\Users\Admin\AppData\Local\Temp\034a87ae1b3c8856d075fd235db5a799.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\034a87ae1b3c8856d075fd235db5a799.exe"C:\Users\Admin\AppData\Local\Temp\034a87ae1b3c8856d075fd235db5a799.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676
-
-