Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 18:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
72b4cf31ad43c079785c4b015c46d88b.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
72b4cf31ad43c079785c4b015c46d88b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
72b4cf31ad43c079785c4b015c46d88b.exe
-
Size
316KB
-
MD5
72b4cf31ad43c079785c4b015c46d88b
-
SHA1
9c676acb9f4626d7a9aaeeeedf8e38a23e89c709
-
SHA256
32c90cd2cf306e8f4436ad11fcda9a872420694ba5961716b6abc6c4d8feea73
-
SHA512
19a1a2ef306443c941c2cb23115dc767233211661846b30c3eccdc58c968043afefbf1ed12575c4eca07bdcb25441207bea2e50f1dc31c89e9dbe245a8606ee1
-
SSDEEP
6144:77vjeoTBoGttTiJz92aSF1Fxv4gxc7b3O+PIIhrAB3J4tAOb/ZY3o:7xiJ/SVNChsJODb4o
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 308 set thread context of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 308 wrote to memory of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28 PID 308 wrote to memory of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28 PID 308 wrote to memory of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28 PID 308 wrote to memory of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28 PID 308 wrote to memory of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28 PID 308 wrote to memory of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28 PID 308 wrote to memory of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28 PID 308 wrote to memory of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28 PID 308 wrote to memory of 1768 308 72b4cf31ad43c079785c4b015c46d88b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\72b4cf31ad43c079785c4b015c46d88b.exe"C:\Users\Admin\AppData\Local\Temp\72b4cf31ad43c079785c4b015c46d88b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Local\Temp\72b4cf31ad43c079785c4b015c46d88b.exe"C:\Users\Admin\AppData\Local\Temp\72b4cf31ad43c079785c4b015c46d88b.exe"2⤵PID:1768
-