Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 11:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4e237cb9d07b5b1cdb4632d58f6872f0.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4e237cb9d07b5b1cdb4632d58f6872f0.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4e237cb9d07b5b1cdb4632d58f6872f0.exe
-
Size
228KB
-
MD5
4e237cb9d07b5b1cdb4632d58f6872f0
-
SHA1
b68706b2cf6869be1bf2c9f4b9a5c5eedea1076f
-
SHA256
8aed9cb28e0d964ce183de82cd1d58dc196e8cf1948690cc699a10ff1601cf01
-
SHA512
6c04fde7e4581cc57ffa891d3b4a3ebc3cbefd187f99d01a80fad8835cf425e3ce2b27625e1f690338414c0bff336213aebf27ab5f1d1eca90b71522df5aba43
-
SSDEEP
6144:UQ/0K9vMUYmySsXpLl3f2qeeCNrL/UlfWCMxdGHg8BU2cc75Sq:UQ8bSsP+qtsrL/UlRMrOSq
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1872 set thread context of 2700 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2700 4e237cb9d07b5b1cdb4632d58f6872f0.exe 2700 4e237cb9d07b5b1cdb4632d58f6872f0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2700 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe 28 PID 1872 wrote to memory of 2700 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe 28 PID 1872 wrote to memory of 2700 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe 28 PID 1872 wrote to memory of 2700 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe 28 PID 1872 wrote to memory of 2700 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe 28 PID 1872 wrote to memory of 2700 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe 28 PID 1872 wrote to memory of 2700 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe 28 PID 1872 wrote to memory of 2700 1872 4e237cb9d07b5b1cdb4632d58f6872f0.exe 28 PID 2700 wrote to memory of 1144 2700 4e237cb9d07b5b1cdb4632d58f6872f0.exe 12 PID 2700 wrote to memory of 1144 2700 4e237cb9d07b5b1cdb4632d58f6872f0.exe 12 PID 2700 wrote to memory of 1144 2700 4e237cb9d07b5b1cdb4632d58f6872f0.exe 12 PID 2700 wrote to memory of 1144 2700 4e237cb9d07b5b1cdb4632d58f6872f0.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\4e237cb9d07b5b1cdb4632d58f6872f0.exe"C:\Users\Admin\AppData\Local\Temp\4e237cb9d07b5b1cdb4632d58f6872f0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\4e237cb9d07b5b1cdb4632d58f6872f0.exeC:\Users\Admin\AppData\Local\Temp\4e237cb9d07b5b1cdb4632d58f6872f0.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700
-
-