Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 09:35
Static task
static1
Behavioral task
behavioral1
Sample
14a3c2e3dfdb884e6820c6d104564ccf.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
14a3c2e3dfdb884e6820c6d104564ccf.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
14a3c2e3dfdb884e6820c6d104564ccf.exe
-
Size
607KB
-
MD5
14a3c2e3dfdb884e6820c6d104564ccf
-
SHA1
2f806bdac610ed35db2932fef89f609d3fd98f91
-
SHA256
e92ddb532e33e18d895b902b5985f35994b4176cf9d6838b7b3625f9c79bd244
-
SHA512
5cf82f52c20c2623d6123ee4c336783fd7120cc6c9bef0c48162890f79d766a9f7d8a3683a2135aba042bf652122cdf4cd89c239a035d4dc1d3c9a53809d3a50
-
SSDEEP
12288:cMe35Hf+z/10ysEEX0Wd5AYqXMmNcEjv3BsNM:cpJHfCpEEoOYs9jvS
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1820 14a3c2e3dfdb884e6820c6d104564ccf.exe 2360 14a3c2e3dfdb884e6820c6d104564ccf.exe 3064 14a3c2e3dfdb884e6820c6d104564ccf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2360 1820 14a3c2e3dfdb884e6820c6d104564ccf.exe 28 PID 1820 wrote to memory of 2360 1820 14a3c2e3dfdb884e6820c6d104564ccf.exe 28 PID 1820 wrote to memory of 2360 1820 14a3c2e3dfdb884e6820c6d104564ccf.exe 28 PID 1820 wrote to memory of 2360 1820 14a3c2e3dfdb884e6820c6d104564ccf.exe 28 PID 1820 wrote to memory of 3064 1820 14a3c2e3dfdb884e6820c6d104564ccf.exe 29 PID 1820 wrote to memory of 3064 1820 14a3c2e3dfdb884e6820c6d104564ccf.exe 29 PID 1820 wrote to memory of 3064 1820 14a3c2e3dfdb884e6820c6d104564ccf.exe 29 PID 1820 wrote to memory of 3064 1820 14a3c2e3dfdb884e6820c6d104564ccf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\14a3c2e3dfdb884e6820c6d104564ccf.exe"C:\Users\Admin\AppData\Local\Temp\14a3c2e3dfdb884e6820c6d104564ccf.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\14a3c2e3dfdb884e6820c6d104564ccf.exestart2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\14a3c2e3dfdb884e6820c6d104564ccf.exewatch2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3064
-