Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2579b09f6eea6112edea3d6e5b7c6afe.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2579b09f6eea6112edea3d6e5b7c6afe.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
2579b09f6eea6112edea3d6e5b7c6afe.exe
-
Size
576KB
-
MD5
2579b09f6eea6112edea3d6e5b7c6afe
-
SHA1
9af775290bca40cc15149d0a42796794910929f9
-
SHA256
c6111bd18930543f8282a19505f7f73deb4567dcf75744fd13d3355402bc3bed
-
SHA512
2d7f6c1e928eea8e7a045db8ba968820075034269e42555f572720b0a393fd45d8cdbd85384d5f9036076207654058684bbfa83e554b30e6a1b2d40c87047a29
-
SSDEEP
12288:e0IbsQoyZOu72KvvryrvawB7CnYR85BzZ25VsGJYz5xx5emqNAUNJ3WICoXKC2/6:eZqyF2KXryrv1Bipjs5Jg5b5emUAUNJx
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3004 set thread context of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 set thread context of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 1380 set thread context of 2828 1380 2579b09f6eea6112edea3d6e5b7c6afe.exe 30 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 1380 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 28 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 1380 wrote to memory of 2828 1380 2579b09f6eea6112edea3d6e5b7c6afe.exe 30 PID 1380 wrote to memory of 2828 1380 2579b09f6eea6112edea3d6e5b7c6afe.exe 30 PID 1380 wrote to memory of 2828 1380 2579b09f6eea6112edea3d6e5b7c6afe.exe 30 PID 1380 wrote to memory of 2828 1380 2579b09f6eea6112edea3d6e5b7c6afe.exe 30 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 1380 wrote to memory of 2828 1380 2579b09f6eea6112edea3d6e5b7c6afe.exe 30 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 1380 wrote to memory of 2828 1380 2579b09f6eea6112edea3d6e5b7c6afe.exe 30 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 1380 wrote to memory of 2828 1380 2579b09f6eea6112edea3d6e5b7c6afe.exe 30 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 3004 wrote to memory of 2296 3004 2579b09f6eea6112edea3d6e5b7c6afe.exe 29 PID 1380 wrote to memory of 2828 1380 2579b09f6eea6112edea3d6e5b7c6afe.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2579b09f6eea6112edea3d6e5b7c6afe.exe"C:\Users\Admin\AppData\Local\Temp\2579b09f6eea6112edea3d6e5b7c6afe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\2579b09f6eea6112edea3d6e5b7c6afe.exeC:\Users\Admin\AppData\Local\Temp\2579b09f6eea6112edea3d6e5b7c6afe.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\2579b09f6eea6112edea3d6e5b7c6afe.exe"C:\Users\Admin\AppData\Local\Temp\2579b09f6eea6112edea3d6e5b7c6afe.exe"3⤵PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\2579b09f6eea6112edea3d6e5b7c6afe.exeC:\Users\Admin\AppData\Local\Temp\2579b09f6eea6112edea3d6e5b7c6afe.exe2⤵PID:2296
-