Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 16:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
M6-46 1172024.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
M6-46 1172024.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
M6-46 1172024.exe
-
Size
650KB
-
MD5
8ce5735da259938567561bba69ef0332
-
SHA1
029cee5c0f4bd092c0b1388b5832d29a830011e0
-
SHA256
90a816585502a326fa5cce7d09dda0ff21b3c1a932d48d5096e031eb14124ea7
-
SHA512
0fa0caddb355d78746807ddaead2d5217aaf233b10e497bddb5a35f083ea541cf5aa674bf904ead07ae3eb2a105a5dd0c68bd726288ee0f0415734151ccb67ec
-
SSDEEP
12288:ZOAx6X60bYMBlXZvnFoCc54poj432UFHNDeXD+vvuTpmE24m:ZlaLZqQpvxeXD+kpHz
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 880 set thread context of 2608 880 M6-46 1172024.exe 29 PID 2608 set thread context of 1392 2608 M6-46 1172024.exe 7 PID 2608 set thread context of 2636 2608 M6-46 1172024.exe 32 PID 2636 set thread context of 1392 2636 netiougc.exe 7 -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 880 M6-46 1172024.exe 880 M6-46 1172024.exe 880 M6-46 1172024.exe 2608 M6-46 1172024.exe 2608 M6-46 1172024.exe 2608 M6-46 1172024.exe 2608 M6-46 1172024.exe 2608 M6-46 1172024.exe 2608 M6-46 1172024.exe 2608 M6-46 1172024.exe 2608 M6-46 1172024.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe 2636 netiougc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2608 M6-46 1172024.exe 1392 Explorer.EXE 1392 Explorer.EXE 2636 netiougc.exe 2636 netiougc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 880 M6-46 1172024.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 880 wrote to memory of 2092 880 M6-46 1172024.exe 28 PID 880 wrote to memory of 2092 880 M6-46 1172024.exe 28 PID 880 wrote to memory of 2092 880 M6-46 1172024.exe 28 PID 880 wrote to memory of 2092 880 M6-46 1172024.exe 28 PID 880 wrote to memory of 3012 880 M6-46 1172024.exe 31 PID 880 wrote to memory of 3012 880 M6-46 1172024.exe 31 PID 880 wrote to memory of 3012 880 M6-46 1172024.exe 31 PID 880 wrote to memory of 3012 880 M6-46 1172024.exe 31 PID 880 wrote to memory of 2856 880 M6-46 1172024.exe 30 PID 880 wrote to memory of 2856 880 M6-46 1172024.exe 30 PID 880 wrote to memory of 2856 880 M6-46 1172024.exe 30 PID 880 wrote to memory of 2856 880 M6-46 1172024.exe 30 PID 880 wrote to memory of 2608 880 M6-46 1172024.exe 29 PID 880 wrote to memory of 2608 880 M6-46 1172024.exe 29 PID 880 wrote to memory of 2608 880 M6-46 1172024.exe 29 PID 880 wrote to memory of 2608 880 M6-46 1172024.exe 29 PID 880 wrote to memory of 2608 880 M6-46 1172024.exe 29 PID 880 wrote to memory of 2608 880 M6-46 1172024.exe 29 PID 880 wrote to memory of 2608 880 M6-46 1172024.exe 29 PID 1392 wrote to memory of 2636 1392 Explorer.EXE 32 PID 1392 wrote to memory of 2636 1392 Explorer.EXE 32 PID 1392 wrote to memory of 2636 1392 Explorer.EXE 32 PID 1392 wrote to memory of 2636 1392 Explorer.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"2⤵PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"2⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"C:\Users\Admin\AppData\Local\Temp\M6-46 1172024.exe"2⤵PID:3012
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\netiougc.exe"C:\Windows\SysWOW64\netiougc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2636
-