Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
277f0d0e8726222bac258b0941600f82.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
277f0d0e8726222bac258b0941600f82.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
277f0d0e8726222bac258b0941600f82.exe
-
Size
18KB
-
MD5
277f0d0e8726222bac258b0941600f82
-
SHA1
33fe13a372e2ebd213794e6deff904e665c62365
-
SHA256
c83e8916492c94cd9235b77d9bb087f95adef73831bf347d0dab9675602b7f94
-
SHA512
ce314b1ecb3598758cdaec56e8136740a2a25f748b117c7cc5acbd8e94524667f69914dfff7e03e34b2a9e82b77fe525a863acdaf13ab8fa69af749724caec6f
-
SSDEEP
384:AXdhzPg120g5NHUZqiPWep/+8iYYiPZR8rGxbW85vBMVB9:APaf0SqiPWaiYxPZiqxbW8ls
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1796 set thread context of 1704 1796 277f0d0e8726222bac258b0941600f82.exe 16 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1704 1796 277f0d0e8726222bac258b0941600f82.exe 16 PID 1796 wrote to memory of 1704 1796 277f0d0e8726222bac258b0941600f82.exe 16 PID 1796 wrote to memory of 1704 1796 277f0d0e8726222bac258b0941600f82.exe 16 PID 1796 wrote to memory of 1704 1796 277f0d0e8726222bac258b0941600f82.exe 16 PID 1796 wrote to memory of 1704 1796 277f0d0e8726222bac258b0941600f82.exe 16 PID 1796 wrote to memory of 1704 1796 277f0d0e8726222bac258b0941600f82.exe 16 PID 1796 wrote to memory of 1704 1796 277f0d0e8726222bac258b0941600f82.exe 16 PID 1796 wrote to memory of 1704 1796 277f0d0e8726222bac258b0941600f82.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\277f0d0e8726222bac258b0941600f82.exeC:\Users\Admin\AppData\Local\Temp\277f0d0e8726222bac258b0941600f82.exe1⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\277f0d0e8726222bac258b0941600f82.exe"C:\Users\Admin\AppData\Local\Temp\277f0d0e8726222bac258b0941600f82.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1796