Analysis
-
max time kernel
99s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 08:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e-dekont.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e-dekont.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
e-dekont.exe
-
Size
938KB
-
MD5
1c808f1d1595115996f6abc5e855ae35
-
SHA1
61bc2dffa9ed8d6d23768996f10625769659444a
-
SHA256
3f72928d0f49086a7a5f96d15e5e3eb0dac7a7927da3717bc6d90d576877c88e
-
SHA512
9e74e1323ac5964c873a9c0076dc21a2821621c33991a6f12524732b4e86aad84db8c340caddb5187ae61e160bfc4fc13edf40a25291080b191547a0347a15a6
-
SSDEEP
12288:h85rryO3vT8NrsBYj/Ghvn4LrTMRziamZcUswhBYC1C9ivI3UJB2gTc603:C5rG8vT8ddJLSziamyUfhf1CInrc603
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3424 set thread context of 2492 3424 e-dekont.exe 99 PID 2492 set thread context of 3432 2492 e-dekont.exe 48 PID 2492 set thread context of 4880 2492 e-dekont.exe 103 PID 4880 set thread context of 3432 4880 tasklist.exe 48 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4880 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 2492 e-dekont.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe 4880 tasklist.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2492 e-dekont.exe 3432 Explorer.EXE 3432 Explorer.EXE 4880 tasklist.exe 4880 tasklist.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3424 wrote to memory of 2492 3424 e-dekont.exe 99 PID 3424 wrote to memory of 2492 3424 e-dekont.exe 99 PID 3424 wrote to memory of 2492 3424 e-dekont.exe 99 PID 3424 wrote to memory of 2492 3424 e-dekont.exe 99 PID 3424 wrote to memory of 2492 3424 e-dekont.exe 99 PID 3424 wrote to memory of 2492 3424 e-dekont.exe 99 PID 3432 wrote to memory of 4880 3432 Explorer.EXE 103 PID 3432 wrote to memory of 4880 3432 Explorer.EXE 103 PID 3432 wrote to memory of 4880 3432 Explorer.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\e-dekont.exe"C:\Users\Admin\AppData\Local\Temp\e-dekont.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\e-dekont.exe"C:\Users\Admin\AppData\Local\Temp\e-dekont.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2492
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\tasklist.exe"C:\Windows\SysWOW64\tasklist.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates processes with tasklist
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4880 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2816
-
-