Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 17:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
46bdfc494e1fcb743c8f7fc2722ec716.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
46bdfc494e1fcb743c8f7fc2722ec716.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
46bdfc494e1fcb743c8f7fc2722ec716.exe
-
Size
67KB
-
MD5
46bdfc494e1fcb743c8f7fc2722ec716
-
SHA1
a111b1563f4422963222aaee7d80b182238d0eb5
-
SHA256
88dc580234c9dd24c2d7bca59bd81f8b60c2f8ce056eb9ff3641fda03d29ffcf
-
SHA512
9f5e2e393b8399cf252578915ee5f992d4ef424e5f263b2ae46f82ee1f11e6082f98746c514bf1cad2e34aae8566de2ebb21d71b4127631aa2561256103e9d88
-
SSDEEP
768:efrx2A8f3tIe5zC9tv/b8yHE53oSorRUvCsguxv3Vrpl859ubT3VpcxvSbMHnUTK:hAk3tmY5Kr2CshxHGK7HqUT60ek8
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2256 set thread context of 4772 2256 46bdfc494e1fcb743c8f7fc2722ec716.exe 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4772 46bdfc494e1fcb743c8f7fc2722ec716.exe 4772 46bdfc494e1fcb743c8f7fc2722ec716.exe 4772 46bdfc494e1fcb743c8f7fc2722ec716.exe 4772 46bdfc494e1fcb743c8f7fc2722ec716.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 46bdfc494e1fcb743c8f7fc2722ec716.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2256 wrote to memory of 4772 2256 46bdfc494e1fcb743c8f7fc2722ec716.exe 89 PID 2256 wrote to memory of 4772 2256 46bdfc494e1fcb743c8f7fc2722ec716.exe 89 PID 2256 wrote to memory of 4772 2256 46bdfc494e1fcb743c8f7fc2722ec716.exe 89 PID 2256 wrote to memory of 4772 2256 46bdfc494e1fcb743c8f7fc2722ec716.exe 89 PID 2256 wrote to memory of 4772 2256 46bdfc494e1fcb743c8f7fc2722ec716.exe 89 PID 2256 wrote to memory of 4772 2256 46bdfc494e1fcb743c8f7fc2722ec716.exe 89 PID 2256 wrote to memory of 4772 2256 46bdfc494e1fcb743c8f7fc2722ec716.exe 89 PID 4772 wrote to memory of 3520 4772 46bdfc494e1fcb743c8f7fc2722ec716.exe 19 PID 4772 wrote to memory of 3520 4772 46bdfc494e1fcb743c8f7fc2722ec716.exe 19 PID 4772 wrote to memory of 3520 4772 46bdfc494e1fcb743c8f7fc2722ec716.exe 19 PID 4772 wrote to memory of 3520 4772 46bdfc494e1fcb743c8f7fc2722ec716.exe 19
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\46bdfc494e1fcb743c8f7fc2722ec716.exe"C:\Users\Admin\AppData\Local\Temp\46bdfc494e1fcb743c8f7fc2722ec716.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\46bdfc494e1fcb743c8f7fc2722ec716.exeC:\Users\Admin\AppData\Local\Temp\46bdfc494e1fcb743c8f7fc2722ec716.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772
-
-