Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 21:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
75820747af375bc424a6af2155ad1d4e.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
75820747af375bc424a6af2155ad1d4e.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
75820747af375bc424a6af2155ad1d4e.exe
-
Size
324KB
-
MD5
75820747af375bc424a6af2155ad1d4e
-
SHA1
56ee47871d474f877d403a52e5afc872c6b36d1e
-
SHA256
9a7d9fd6550e6ce56b7845447bb426a20b8b9f7781c5611681d87b2a62bde3bc
-
SHA512
af482792a3a0400e419cdf0addb85f2989d66e237e9db5c7774e811a00996b9a5b1a72a1a2308bb681830bee341ab4935a4898fa1eae09a633acad0ccd48acc6
-
SSDEEP
6144:81CSGw5G5Y1dFwJGzOmcEnmv87x9XwONdrvXTkghKbydraHY:ICSQ5Mhik4819Xd1vXTkg42gHY
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3788 set thread context of 1380 3788 75820747af375bc424a6af2155ad1d4e.exe 88 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3788 wrote to memory of 1380 3788 75820747af375bc424a6af2155ad1d4e.exe 88 PID 3788 wrote to memory of 1380 3788 75820747af375bc424a6af2155ad1d4e.exe 88 PID 3788 wrote to memory of 1380 3788 75820747af375bc424a6af2155ad1d4e.exe 88 PID 3788 wrote to memory of 1380 3788 75820747af375bc424a6af2155ad1d4e.exe 88 PID 3788 wrote to memory of 1380 3788 75820747af375bc424a6af2155ad1d4e.exe 88 PID 3788 wrote to memory of 1380 3788 75820747af375bc424a6af2155ad1d4e.exe 88 PID 3788 wrote to memory of 1380 3788 75820747af375bc424a6af2155ad1d4e.exe 88 PID 3788 wrote to memory of 1380 3788 75820747af375bc424a6af2155ad1d4e.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\75820747af375bc424a6af2155ad1d4e.exe"C:\Users\Admin\AppData\Local\Temp\75820747af375bc424a6af2155ad1d4e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\75820747af375bc424a6af2155ad1d4e.exe"C:\Users\Admin\AppData\Local\Temp\75820747af375bc424a6af2155ad1d4e.exe"2⤵PID:1380
-