Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 00:47
Behavioral task
behavioral1
Sample
223481b2716424c55b698a70a7723430.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
223481b2716424c55b698a70a7723430.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
223481b2716424c55b698a70a7723430.exe
-
Size
402KB
-
MD5
223481b2716424c55b698a70a7723430
-
SHA1
1757166b18b10d1682bc39f4b34a91e02a6dc86d
-
SHA256
a63116967e732956dbbdf760f4c4d291c50184ce21dadb234e194ac1c2e864c4
-
SHA512
01daef8e2cd4d52262ec291c1a0abb0362d110b4258f8c3ecd509fef1c47c7cb149bb551a0853a87966b8b488dd6188c8d2d46bf27417c0026fe7bf3d1c7f8ad
-
SSDEEP
6144:VNKh6l6kPy+PuZkHrsWcmlH72R6GIwNc8FE1O9HGpBgU3E7ju:V4Yba+PdrsWlHSRwIEKkgG
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1276-0-0x0000000000400000-0x000000000052B000-memory.dmp upx behavioral1/memory/1276-6-0x0000000000400000-0x000000000052B000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
223481b2716424c55b698a70a7723430.exe223481b2716424c55b698a70a7723430.exedescription pid process target process PID 1276 set thread context of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 2740 set thread context of 632 2740 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
223481b2716424c55b698a70a7723430.exepid process 1276 223481b2716424c55b698a70a7723430.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
223481b2716424c55b698a70a7723430.exe223481b2716424c55b698a70a7723430.exedescription pid process target process PID 1276 wrote to memory of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 1276 wrote to memory of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 1276 wrote to memory of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 1276 wrote to memory of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 1276 wrote to memory of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 1276 wrote to memory of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 1276 wrote to memory of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 1276 wrote to memory of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 1276 wrote to memory of 2740 1276 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 2740 wrote to memory of 632 2740 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 2740 wrote to memory of 632 2740 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 2740 wrote to memory of 632 2740 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 2740 wrote to memory of 632 2740 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 2740 wrote to memory of 632 2740 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 2740 wrote to memory of 632 2740 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 2740 wrote to memory of 632 2740 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe PID 2740 wrote to memory of 632 2740 223481b2716424c55b698a70a7723430.exe 223481b2716424c55b698a70a7723430.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\223481b2716424c55b698a70a7723430.exe"C:\Users\Admin\AppData\Local\Temp\223481b2716424c55b698a70a7723430.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\223481b2716424c55b698a70a7723430.exe"C:\Users\Admin\AppData\Local\Temp\223481b2716424c55b698a70a7723430.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\223481b2716424c55b698a70a7723430.exemine.exe -a 59 -o http://hdzx.aquarium-stakany.org:8332/ -u darkSons_crypt -p pt3⤵PID:632
-
-