Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
23671a94e7a84481bc9e641574f12baf.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
23671a94e7a84481bc9e641574f12baf.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
23671a94e7a84481bc9e641574f12baf.exe
-
Size
40KB
-
MD5
23671a94e7a84481bc9e641574f12baf
-
SHA1
e16de615cc0210b3b0b7c20a80b26e212e638a11
-
SHA256
4299d2fa191199728c2ad5bb33447a16d674f378d87d88674ce2a941dbbb6471
-
SHA512
81c1694ac1708c1ba2b9d08b6736248fe9a3f0d8aec13ff5946c1db8666d4e106b5d7b6082ffd42f41e29e399984bb7bf9b3e644e9411a9df218c94ef4f6f4bc
-
SSDEEP
384:+bJwLMO4BncfQVIw5qpuUib7Go/gkZlWGlVgrjvt2VY:qOAcflp/iPGo/g8lWGUfl
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2452 set thread context of 1180 2452 23671a94e7a84481bc9e641574f12baf.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2452 23671a94e7a84481bc9e641574f12baf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2452 wrote to memory of 1180 2452 23671a94e7a84481bc9e641574f12baf.exe 28 PID 2452 wrote to memory of 1180 2452 23671a94e7a84481bc9e641574f12baf.exe 28 PID 2452 wrote to memory of 1180 2452 23671a94e7a84481bc9e641574f12baf.exe 28 PID 2452 wrote to memory of 1180 2452 23671a94e7a84481bc9e641574f12baf.exe 28 PID 2452 wrote to memory of 1180 2452 23671a94e7a84481bc9e641574f12baf.exe 28 PID 2452 wrote to memory of 1180 2452 23671a94e7a84481bc9e641574f12baf.exe 28 PID 2452 wrote to memory of 1180 2452 23671a94e7a84481bc9e641574f12baf.exe 28 PID 2452 wrote to memory of 1180 2452 23671a94e7a84481bc9e641574f12baf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23671a94e7a84481bc9e641574f12baf.exe"C:\Users\Admin\AppData\Local\Temp\23671a94e7a84481bc9e641574f12baf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\23671a94e7a84481bc9e641574f12baf.exe"C:\Users\Admin\AppData\Local\Temp\23671a94e7a84481bc9e641574f12baf.exe"2⤵PID:1180
-