Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 20:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1c4210e762c12e22cdd155941b6dc8ee.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1c4210e762c12e22cdd155941b6dc8ee.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
1c4210e762c12e22cdd155941b6dc8ee.exe
-
Size
56KB
-
MD5
1c4210e762c12e22cdd155941b6dc8ee
-
SHA1
f906cc40cd49073d85c5165d7e55b7822803c226
-
SHA256
77eb3e8a7eca667501b1b54cdeca3c7265a8df7811d87e7dc1a937b4f05665d2
-
SHA512
65676a0cb252947817d835de62906eb508480706b429bcd3247b3873796ff1ef350fc8043da754bad71e7c1a0caf013021af63805cec09b1a12549bdfeab7226
-
SSDEEP
1536:Ug9qdz3TS7R3zP4bIFZjzalez4RMVlSHFCoMP:T23TS79zP4baVYezOMVlSFQ
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2576 set thread context of 2696 2576 1c4210e762c12e22cdd155941b6dc8ee.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2696 1c4210e762c12e22cdd155941b6dc8ee.exe 2696 1c4210e762c12e22cdd155941b6dc8ee.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2696 2576 1c4210e762c12e22cdd155941b6dc8ee.exe 28 PID 2576 wrote to memory of 2696 2576 1c4210e762c12e22cdd155941b6dc8ee.exe 28 PID 2576 wrote to memory of 2696 2576 1c4210e762c12e22cdd155941b6dc8ee.exe 28 PID 2576 wrote to memory of 2696 2576 1c4210e762c12e22cdd155941b6dc8ee.exe 28 PID 2576 wrote to memory of 2696 2576 1c4210e762c12e22cdd155941b6dc8ee.exe 28 PID 2576 wrote to memory of 2696 2576 1c4210e762c12e22cdd155941b6dc8ee.exe 28 PID 2696 wrote to memory of 1212 2696 1c4210e762c12e22cdd155941b6dc8ee.exe 17 PID 2696 wrote to memory of 1212 2696 1c4210e762c12e22cdd155941b6dc8ee.exe 17 PID 2696 wrote to memory of 1212 2696 1c4210e762c12e22cdd155941b6dc8ee.exe 17 PID 2696 wrote to memory of 1212 2696 1c4210e762c12e22cdd155941b6dc8ee.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\1c4210e762c12e22cdd155941b6dc8ee.exe"C:\Users\Admin\AppData\Local\Temp\1c4210e762c12e22cdd155941b6dc8ee.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\1c4210e762c12e22cdd155941b6dc8ee.exe"C:\Users\Admin\AppData\Local\Temp\1c4210e762c12e22cdd155941b6dc8ee.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696
-
-