Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 05:29
Behavioral task
behavioral1
Sample
6496cbf54d708f05509c03f0d6bdbd2e.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6496cbf54d708f05509c03f0d6bdbd2e.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
6496cbf54d708f05509c03f0d6bdbd2e.exe
-
Size
43KB
-
MD5
6496cbf54d708f05509c03f0d6bdbd2e
-
SHA1
07bfc3552304bff2eae2a2e98793ec08a490a167
-
SHA256
cab387260f8955529aa9afb76feff4c61e969d66883b21e9687d17bd43a0a789
-
SHA512
bae51b8a0846fc4fef1a09e0b5973c7232b44a3b9bd37f0a056f5731d9507394999a92db034bdaa2ae6455542d427b4d69b28f0093b2aaeb9dae0b5cb54f1403
-
SSDEEP
768:lse14URoiwNzRrWDJqurhUbOzZrIjmL1WYeTebIjTRV3P/oqqiK:lD44wNzRrWNFh1Cw17cjFZ/ozj
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1404-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1404-8-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1404 set thread context of 2488 1404 6496cbf54d708f05509c03f0d6bdbd2e.exe 88 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2488 6496cbf54d708f05509c03f0d6bdbd2e.exe 2488 6496cbf54d708f05509c03f0d6bdbd2e.exe 2488 6496cbf54d708f05509c03f0d6bdbd2e.exe 2488 6496cbf54d708f05509c03f0d6bdbd2e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1636 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1404 6496cbf54d708f05509c03f0d6bdbd2e.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2488 1404 6496cbf54d708f05509c03f0d6bdbd2e.exe 88 PID 1404 wrote to memory of 2488 1404 6496cbf54d708f05509c03f0d6bdbd2e.exe 88 PID 1404 wrote to memory of 2488 1404 6496cbf54d708f05509c03f0d6bdbd2e.exe 88 PID 1404 wrote to memory of 2488 1404 6496cbf54d708f05509c03f0d6bdbd2e.exe 88 PID 1404 wrote to memory of 2488 1404 6496cbf54d708f05509c03f0d6bdbd2e.exe 88 PID 1404 wrote to memory of 2488 1404 6496cbf54d708f05509c03f0d6bdbd2e.exe 88 PID 1404 wrote to memory of 2488 1404 6496cbf54d708f05509c03f0d6bdbd2e.exe 88 PID 2488 wrote to memory of 3436 2488 6496cbf54d708f05509c03f0d6bdbd2e.exe 44 PID 2488 wrote to memory of 3436 2488 6496cbf54d708f05509c03f0d6bdbd2e.exe 44 PID 2488 wrote to memory of 3436 2488 6496cbf54d708f05509c03f0d6bdbd2e.exe 44 PID 2488 wrote to memory of 3436 2488 6496cbf54d708f05509c03f0d6bdbd2e.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\6496cbf54d708f05509c03f0d6bdbd2e.exe"C:\Users\Admin\AppData\Local\Temp\6496cbf54d708f05509c03f0d6bdbd2e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\6496cbf54d708f05509c03f0d6bdbd2e.exeC:\Users\Admin\AppData\Local\Temp\6496cbf54d708f05509c03f0d6bdbd2e.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636