Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 07:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4042c6cfa6ac0c8ccf74f07bb2a44049.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4042c6cfa6ac0c8ccf74f07bb2a44049.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
4042c6cfa6ac0c8ccf74f07bb2a44049.exe
-
Size
202KB
-
MD5
4042c6cfa6ac0c8ccf74f07bb2a44049
-
SHA1
600883edf59c46a01124c43f2983b66214218c09
-
SHA256
ce0584857256a1c3866f5ccb87b6a985e354aba9ada904011ce83350a1a25ee8
-
SHA512
bf583ca396f165bdcd51a96f0b80d184f409e759f9770795156a664f4756e193e3271b8577727d765d216a2defbb9b4181a95f92154275cb8217b121b7b3d400
-
SSDEEP
6144:I6P+5VtptZhtuWOxYlKcPZDldnSMrhqb86c9:I6PiNuJYx3nfrYbc9
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3132 set thread context of 2360 3132 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 89 PID 2360 set thread context of 3360 2360 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 72 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3132 wrote to memory of 2360 3132 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 89 PID 3132 wrote to memory of 2360 3132 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 89 PID 3132 wrote to memory of 2360 3132 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 89 PID 3132 wrote to memory of 2360 3132 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 89 PID 3132 wrote to memory of 2360 3132 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 89 PID 2360 wrote to memory of 3360 2360 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 72 PID 2360 wrote to memory of 3360 2360 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 72 PID 2360 wrote to memory of 3360 2360 4042c6cfa6ac0c8ccf74f07bb2a44049.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\4042c6cfa6ac0c8ccf74f07bb2a44049.exe"C:\Users\Admin\AppData\Local\Temp\4042c6cfa6ac0c8ccf74f07bb2a44049.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\4042c6cfa6ac0c8ccf74f07bb2a44049.exeC:\Users\Admin\AppData\Local\Temp\4042c6cfa6ac0c8ccf74f07bb2a44049.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2360
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3360