Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 00:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08e70bccd483cc8241b13382d5fc0f80.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
08e70bccd483cc8241b13382d5fc0f80.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
08e70bccd483cc8241b13382d5fc0f80.exe
-
Size
514KB
-
MD5
08e70bccd483cc8241b13382d5fc0f80
-
SHA1
de9f0eda20f9d95f87f036930bd566ab47fed342
-
SHA256
4142de453e3d90841919f28ceceb74f8c02e4aea9c378290eded8d84eb5c676a
-
SHA512
74d9e041ee5e8a0677c5bc8804c0fe870274affd6b2b6eb4f844c486fbdd232a9b1b8068708254ef4e0577f8aa1812610b8b563ef74b6e63871bb024fccf4636
-
SSDEEP
12288:B+ODrHk0C5YkGz6JyGjbNnCMwlJk5IBBYdFsqlKN57dCfOfS:Bt7k0C5toGh0BByTKj4Wq
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2216 set thread context of 2736 2216 08e70bccd483cc8241b13382d5fc0f80.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 08e70bccd483cc8241b13382d5fc0f80.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2736 2216 08e70bccd483cc8241b13382d5fc0f80.exe 28 PID 2216 wrote to memory of 2736 2216 08e70bccd483cc8241b13382d5fc0f80.exe 28 PID 2216 wrote to memory of 2736 2216 08e70bccd483cc8241b13382d5fc0f80.exe 28 PID 2216 wrote to memory of 2736 2216 08e70bccd483cc8241b13382d5fc0f80.exe 28 PID 2216 wrote to memory of 2736 2216 08e70bccd483cc8241b13382d5fc0f80.exe 28 PID 2216 wrote to memory of 2736 2216 08e70bccd483cc8241b13382d5fc0f80.exe 28 PID 2216 wrote to memory of 2736 2216 08e70bccd483cc8241b13382d5fc0f80.exe 28 PID 2216 wrote to memory of 2736 2216 08e70bccd483cc8241b13382d5fc0f80.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e70bccd483cc8241b13382d5fc0f80.exe"C:\Users\Admin\AppData\Local\Temp\08e70bccd483cc8241b13382d5fc0f80.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\08e70bccd483cc8241b13382d5fc0f80.exeC:\Users\Admin\AppData\Local\Temp\08e70bccd483cc8241b13382d5fc0f80.exe2⤵PID:2736
-