Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 00:30
Behavioral task
behavioral1
Sample
6401df864e1554915006fe6a4a20136d.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6401df864e1554915006fe6a4a20136d.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
6401df864e1554915006fe6a4a20136d.exe
-
Size
9KB
-
MD5
6401df864e1554915006fe6a4a20136d
-
SHA1
896c0b8330ef9c506c796ff3f875c50530d492d0
-
SHA256
54e8d447fc4bf8cad2ee76f37cf9fe87244fa5a2eee30b73d9bf0e8b119e3f59
-
SHA512
8406c27766facab7c03f08bd4c446a7cd5adc6a82c6dbab9e7f7f845d136ff8a161810cfb82e42aa2e653c24391b5107c0a20ea11d8d7502c8b6d32838d44772
-
SSDEEP
96:oT9vxjUmt+ON41pp3j1DG8jCNdmhYyoRHHQOJnBUK0gln2F:oT9vxjUmt3SLG8jC6m3Jnln2F
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4416-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4416-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4416 set thread context of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36 PID 4416 wrote to memory of 3484 4416 6401df864e1554915006fe6a4a20136d.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\6401df864e1554915006fe6a4a20136d.exe"C:\Users\Admin\AppData\Local\Temp\6401df864e1554915006fe6a4a20136d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4416
-