Analysis
-
max time kernel
156s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2a08855e615abd31fe1417a503ccce54.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a08855e615abd31fe1417a503ccce54.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
2a08855e615abd31fe1417a503ccce54.exe
-
Size
69KB
-
MD5
2a08855e615abd31fe1417a503ccce54
-
SHA1
a803853135650472021fd416b04e5f5592919afe
-
SHA256
4ac002b7e28d95575ea8cdfa906dbb5f9ec0bdef6f35f6393e26af28e30c9a49
-
SHA512
98f98d9e930c610184ef7a2dc6363dc4535bdcbfff4c28ae08146266c3b92a78bcd424e21d1fd37bd9f921f3a0631eea1c56eafd5da0ac5dd15de95b003cfadd
-
SSDEEP
1536:aXRBF7YskzjXY/Wt+Fk0dtKGy58JS7y6jrg0iWfEM0:0FUsajXYT6GGiS7y6P3R0
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2788 set thread context of 3752 2788 2a08855e615abd31fe1417a503ccce54.exe 21 PID 2788 set thread context of 0 2788 2a08855e615abd31fe1417a503ccce54.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3752 2a08855e615abd31fe1417a503ccce54.exe 3752 2a08855e615abd31fe1417a503ccce54.exe 3752 2a08855e615abd31fe1417a503ccce54.exe 3752 2a08855e615abd31fe1417a503ccce54.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2788 2a08855e615abd31fe1417a503ccce54.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3752 2788 2a08855e615abd31fe1417a503ccce54.exe 21 PID 2788 wrote to memory of 3752 2788 2a08855e615abd31fe1417a503ccce54.exe 21 PID 2788 wrote to memory of 3752 2788 2a08855e615abd31fe1417a503ccce54.exe 21 PID 2788 wrote to memory of 3752 2788 2a08855e615abd31fe1417a503ccce54.exe 21 PID 2788 wrote to memory of 3752 2788 2a08855e615abd31fe1417a503ccce54.exe 21 PID 2788 wrote to memory of 3752 2788 2a08855e615abd31fe1417a503ccce54.exe 21 PID 2788 wrote to memory of 3752 2788 2a08855e615abd31fe1417a503ccce54.exe 21 PID 2788 wrote to memory of 0 2788 2a08855e615abd31fe1417a503ccce54.exe PID 2788 wrote to memory of 0 2788 2a08855e615abd31fe1417a503ccce54.exe PID 2788 wrote to memory of 0 2788 2a08855e615abd31fe1417a503ccce54.exe PID 2788 wrote to memory of 0 2788 2a08855e615abd31fe1417a503ccce54.exe PID 3752 wrote to memory of 3492 3752 2a08855e615abd31fe1417a503ccce54.exe 46 PID 3752 wrote to memory of 3492 3752 2a08855e615abd31fe1417a503ccce54.exe 46 PID 3752 wrote to memory of 3492 3752 2a08855e615abd31fe1417a503ccce54.exe 46 PID 3752 wrote to memory of 3492 3752 2a08855e615abd31fe1417a503ccce54.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a08855e615abd31fe1417a503ccce54.exe"C:\Users\Admin\AppData\Local\Temp\2a08855e615abd31fe1417a503ccce54.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\2a08855e615abd31fe1417a503ccce54.exe"C:\Users\Admin\AppData\Local\Temp\2a08855e615abd31fe1417a503ccce54.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3752
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3492