Analysis
-
max time kernel
164s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 11:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4e237cb9d07b5b1cdb4632d58f6872f0.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4e237cb9d07b5b1cdb4632d58f6872f0.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
4e237cb9d07b5b1cdb4632d58f6872f0.exe
-
Size
228KB
-
MD5
4e237cb9d07b5b1cdb4632d58f6872f0
-
SHA1
b68706b2cf6869be1bf2c9f4b9a5c5eedea1076f
-
SHA256
8aed9cb28e0d964ce183de82cd1d58dc196e8cf1948690cc699a10ff1601cf01
-
SHA512
6c04fde7e4581cc57ffa891d3b4a3ebc3cbefd187f99d01a80fad8835cf425e3ce2b27625e1f690338414c0bff336213aebf27ab5f1d1eca90b71522df5aba43
-
SSDEEP
6144:UQ/0K9vMUYmySsXpLl3f2qeeCNrL/UlfWCMxdGHg8BU2cc75Sq:UQ8bSsP+qtsrL/UlRMrOSq
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4768 set thread context of 2528 4768 4e237cb9d07b5b1cdb4632d58f6872f0.exe 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2528 4e237cb9d07b5b1cdb4632d58f6872f0.exe 2528 4e237cb9d07b5b1cdb4632d58f6872f0.exe 2528 4e237cb9d07b5b1cdb4632d58f6872f0.exe 2528 4e237cb9d07b5b1cdb4632d58f6872f0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4768 4e237cb9d07b5b1cdb4632d58f6872f0.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4768 wrote to memory of 2528 4768 4e237cb9d07b5b1cdb4632d58f6872f0.exe 89 PID 4768 wrote to memory of 2528 4768 4e237cb9d07b5b1cdb4632d58f6872f0.exe 89 PID 4768 wrote to memory of 2528 4768 4e237cb9d07b5b1cdb4632d58f6872f0.exe 89 PID 4768 wrote to memory of 2528 4768 4e237cb9d07b5b1cdb4632d58f6872f0.exe 89 PID 4768 wrote to memory of 2528 4768 4e237cb9d07b5b1cdb4632d58f6872f0.exe 89 PID 4768 wrote to memory of 2528 4768 4e237cb9d07b5b1cdb4632d58f6872f0.exe 89 PID 4768 wrote to memory of 2528 4768 4e237cb9d07b5b1cdb4632d58f6872f0.exe 89 PID 2528 wrote to memory of 3440 2528 4e237cb9d07b5b1cdb4632d58f6872f0.exe 47 PID 2528 wrote to memory of 3440 2528 4e237cb9d07b5b1cdb4632d58f6872f0.exe 47 PID 2528 wrote to memory of 3440 2528 4e237cb9d07b5b1cdb4632d58f6872f0.exe 47 PID 2528 wrote to memory of 3440 2528 4e237cb9d07b5b1cdb4632d58f6872f0.exe 47
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\4e237cb9d07b5b1cdb4632d58f6872f0.exe"C:\Users\Admin\AppData\Local\Temp\4e237cb9d07b5b1cdb4632d58f6872f0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\4e237cb9d07b5b1cdb4632d58f6872f0.exeC:\Users\Admin\AppData\Local\Temp\4e237cb9d07b5b1cdb4632d58f6872f0.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528
-
-