Analysis
-
max time kernel
92s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 19:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6868d2ec42965ca7d4ec25b0ee1bf9f0.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
6868d2ec42965ca7d4ec25b0ee1bf9f0.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
6868d2ec42965ca7d4ec25b0ee1bf9f0.exe
-
Size
64KB
-
MD5
6868d2ec42965ca7d4ec25b0ee1bf9f0
-
SHA1
7f74093dfdbd06e2322397dbb8dd75b7d3fa7988
-
SHA256
813c2968e83664c1a23972167091f0a29420d9e310c157ebb1c0a2c49b459d55
-
SHA512
2e6b0e101ec9ac0b145052ff416f75b1a435a5dd80bbc2c0856ebff77f8b970341cd3eecf283a9a992994a13555d438b46efaaced4df60fd3e48a87fef57b89f
-
SSDEEP
1536:3JtJVDWLRM6Yb15xTJw7ez7dtXWekk/iYFX:5tJVDWLRM6YbRTJz/b3kQFX
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 4212 1520 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 85 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1520 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1520 wrote to memory of 4212 1520 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 85 PID 1520 wrote to memory of 4212 1520 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 85 PID 1520 wrote to memory of 4212 1520 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 85 PID 1520 wrote to memory of 4212 1520 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 85 PID 1520 wrote to memory of 4212 1520 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 85 PID 1520 wrote to memory of 4212 1520 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 85 PID 1520 wrote to memory of 4212 1520 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 85 PID 4212 wrote to memory of 3524 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 46 PID 4212 wrote to memory of 3524 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 46 PID 4212 wrote to memory of 3524 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 46 PID 4212 wrote to memory of 3524 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 46 PID 4212 wrote to memory of 3524 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 46 PID 4212 wrote to memory of 3524 4212 6868d2ec42965ca7d4ec25b0ee1bf9f0.exe 46
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\6868d2ec42965ca7d4ec25b0ee1bf9f0.exe"C:\Users\Admin\AppData\Local\Temp\6868d2ec42965ca7d4ec25b0ee1bf9f0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\6868d2ec42965ca7d4ec25b0ee1bf9f0.exeC:\Users\Admin\AppData\Local\Temp\6868d2ec42965ca7d4ec25b0ee1bf9f0.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4212
-
-