Analysis
-
max time kernel
135s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
237fbb9112a8c308bc6fd04d9041824e.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
237fbb9112a8c308bc6fd04d9041824e.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
237fbb9112a8c308bc6fd04d9041824e.exe
-
Size
605KB
-
MD5
237fbb9112a8c308bc6fd04d9041824e
-
SHA1
dc6aa077bac2dc3910ba8957d57c47d598d6ce02
-
SHA256
15b6b844b022b66b26ec5cbdef2baeb3ab8bd218a66c80a2a4d01d2eb608d3bf
-
SHA512
6604c0b6d2ad91bfc98634f5a44e35f55ea074d308c2c859d4b10d48aacca75315341c14bd0c6bece79bd7881e6f837a88262913944076795f28c342da6cd7a1
-
SSDEEP
12288:IiTAuQK6Y5NkqZF/r4xKLlO1Dtu3Mi5qsOCUQ2PgMI:VAucqZ9cxAlGDtcMi3OttPo
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2088 237fbb9112a8c308bc6fd04d9041824e.exe 2652 237fbb9112a8c308bc6fd04d9041824e.exe 2384 237fbb9112a8c308bc6fd04d9041824e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2652 2088 237fbb9112a8c308bc6fd04d9041824e.exe 90 PID 2088 wrote to memory of 2652 2088 237fbb9112a8c308bc6fd04d9041824e.exe 90 PID 2088 wrote to memory of 2652 2088 237fbb9112a8c308bc6fd04d9041824e.exe 90 PID 2088 wrote to memory of 2384 2088 237fbb9112a8c308bc6fd04d9041824e.exe 91 PID 2088 wrote to memory of 2384 2088 237fbb9112a8c308bc6fd04d9041824e.exe 91 PID 2088 wrote to memory of 2384 2088 237fbb9112a8c308bc6fd04d9041824e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\237fbb9112a8c308bc6fd04d9041824e.exe"C:\Users\Admin\AppData\Local\Temp\237fbb9112a8c308bc6fd04d9041824e.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\237fbb9112a8c308bc6fd04d9041824e.exestart2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\237fbb9112a8c308bc6fd04d9041824e.exewatch2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2384
-