Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 19:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3adbef82f723292079ae60173f2d6cf3.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3adbef82f723292079ae60173f2d6cf3.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
3adbef82f723292079ae60173f2d6cf3.exe
-
Size
273KB
-
MD5
3adbef82f723292079ae60173f2d6cf3
-
SHA1
853db39ecdb74c451d52a2b0c65519fdf178226e
-
SHA256
4ab697074e9a791aa4c93c15477f7c54b80c9041aa9152260203384d60e0f909
-
SHA512
3bd15068f3d703cbe5a0084811771a8e82a6fd9c386f9c6456bdfda70681524707412534445e96c4849d2b6eb3678891d122068e83c2cbb21a29b3413b62a035
-
SSDEEP
6144:pvGd72w2Ub4S3l+4OCdyOfRLQ3Z9MUa6:pv0ntZ3lgC0OflQJ
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2236 set thread context of 2196 2236 3adbef82f723292079ae60173f2d6cf3.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2236 3adbef82f723292079ae60173f2d6cf3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2196 2236 3adbef82f723292079ae60173f2d6cf3.exe 28 PID 2236 wrote to memory of 2196 2236 3adbef82f723292079ae60173f2d6cf3.exe 28 PID 2236 wrote to memory of 2196 2236 3adbef82f723292079ae60173f2d6cf3.exe 28 PID 2236 wrote to memory of 2196 2236 3adbef82f723292079ae60173f2d6cf3.exe 28 PID 2236 wrote to memory of 2196 2236 3adbef82f723292079ae60173f2d6cf3.exe 28 PID 2236 wrote to memory of 2196 2236 3adbef82f723292079ae60173f2d6cf3.exe 28 PID 2236 wrote to memory of 2196 2236 3adbef82f723292079ae60173f2d6cf3.exe 28 PID 2236 wrote to memory of 2196 2236 3adbef82f723292079ae60173f2d6cf3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3adbef82f723292079ae60173f2d6cf3.exe"C:\Users\Admin\AppData\Local\Temp\3adbef82f723292079ae60173f2d6cf3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\3adbef82f723292079ae60173f2d6cf3.exeC:\Users\Admin\AppData\Local\Temp\3adbef82f723292079ae60173f2d6cf3.exe2⤵PID:2196
-