Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
Setup_WinThruster_2024.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Setup_WinThruster_2024.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Setup_WinThruster_2024.exe
-
Size
7.3MB
-
MD5
62f9258f3ae4774f9dc169a2a0b1d68e
-
SHA1
56164f50722724275c0db381235d3b793f85acd5
-
SHA256
82f5a693742c6c35f1280dbc5a4148598c129208dfc0544a5cd457b7ac8e824a
-
SHA512
ef04a48d957d646e0b4fbdb68bfe59bedfb6f5701dd9497b2bc5abeea57b5d7be5f8694ca59d535c8d14514ecacfb6773476abcd3d2f65a1da7c0c75241d7fd2
-
SSDEEP
98304:cSi3CpUYtyBI5sdXR/YVTWXumt2Q7VJedSNtjrk8rNF3y0HWRR4cmWDjzK45:IClt4I+yTd2rJzrjr7H3r2R2qHb
Score
4/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3680 Setup_WinThruster_2024.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 564 wrote to memory of 3680 564 Setup_WinThruster_2024.exe 92 PID 564 wrote to memory of 3680 564 Setup_WinThruster_2024.exe 92 PID 564 wrote to memory of 3680 564 Setup_WinThruster_2024.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_WinThruster_2024.exe"C:\Users\Admin\AppData\Local\Temp\Setup_WinThruster_2024.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\is-418L8.tmp\Setup_WinThruster_2024.tmp"C:\Users\Admin\AppData\Local\Temp\is-418L8.tmp\Setup_WinThruster_2024.tmp" /SL5="$A0064,6737092,878080,C:\Users\Admin\AppData\Local\Temp\Setup_WinThruster_2024.exe"2⤵
- Executes dropped EXE
PID:3680
-