Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 01:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f96863bb36a4ab7f2a7f52b8c2d673f.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f96863bb36a4ab7f2a7f52b8c2d673f.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
3f96863bb36a4ab7f2a7f52b8c2d673f.exe
-
Size
140KB
-
MD5
3f96863bb36a4ab7f2a7f52b8c2d673f
-
SHA1
1411e45b62d03178e8f652c8ef4a95d5254b0046
-
SHA256
9605d8d85727e9f182789c208ec97d82e07dae94228d5741d0f1e35c4d94b4e3
-
SHA512
028b3852fd2b8d23975dcb92f58443a5e574cfaa6d6a677c0121582709098d1133f140d2187384408642fc4e7d51efbf916d90abfd42015f3f03647deffbfe7b
-
SSDEEP
3072:D+jf387gCyzROwYox9r98hS5a39OGgMQ0EH1m1BF:DqegCEROwTo9/g1/AZ
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 1580 3f96863bb36a4ab7f2a7f52b8c2d673f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14 PID 2360 wrote to memory of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14 PID 2360 wrote to memory of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14 PID 2360 wrote to memory of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14 PID 2360 wrote to memory of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14 PID 2360 wrote to memory of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14 PID 2360 wrote to memory of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14 PID 2360 wrote to memory of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14 PID 2360 wrote to memory of 1580 2360 3f96863bb36a4ab7f2a7f52b8c2d673f.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f96863bb36a4ab7f2a7f52b8c2d673f.exe"C:\Users\Admin\AppData\Local\Temp\3f96863bb36a4ab7f2a7f52b8c2d673f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\3f96863bb36a4ab7f2a7f52b8c2d673f.exeC:\Users\Admin\AppData\Local\Temp\3f96863bb36a4ab7f2a7f52b8c2d673f.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1580
-