Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 19:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7dc59989f2d0775bb83c499047a1d626.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7dc59989f2d0775bb83c499047a1d626.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
7dc59989f2d0775bb83c499047a1d626.exe
-
Size
55KB
-
MD5
7dc59989f2d0775bb83c499047a1d626
-
SHA1
a3a9ce3d50e247bf3f9503db3ea921fd027e584d
-
SHA256
0c8c89bd9ad736608407b45960437a7ba8e9654f74ad1bc8cc05660b44d7fdad
-
SHA512
db5b6e4fc5dad1ba863beff3d5787095a13521a70414b696514dc9d436310819f18dc50abb32d2866a6ee127bc5764891cd3a113345f7a789063567271b0e4c7
-
SSDEEP
768:gkw5yeww45SX5wPGuL482mjdiSk9J4cbmCNjE1mkOt1GV6xCkV:gsewhSX5Yg82mQrJdN41mkO/G60kV
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 772 set thread context of 1308 772 7dc59989f2d0775bb83c499047a1d626.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1308 7dc59989f2d0775bb83c499047a1d626.exe 1308 7dc59989f2d0775bb83c499047a1d626.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 772 7dc59989f2d0775bb83c499047a1d626.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 772 wrote to memory of 1308 772 7dc59989f2d0775bb83c499047a1d626.exe 94 PID 772 wrote to memory of 1308 772 7dc59989f2d0775bb83c499047a1d626.exe 94 PID 772 wrote to memory of 1308 772 7dc59989f2d0775bb83c499047a1d626.exe 94 PID 772 wrote to memory of 1308 772 7dc59989f2d0775bb83c499047a1d626.exe 94 PID 772 wrote to memory of 1308 772 7dc59989f2d0775bb83c499047a1d626.exe 94 PID 772 wrote to memory of 1308 772 7dc59989f2d0775bb83c499047a1d626.exe 94 PID 772 wrote to memory of 1308 772 7dc59989f2d0775bb83c499047a1d626.exe 94 PID 1308 wrote to memory of 3428 1308 7dc59989f2d0775bb83c499047a1d626.exe 42 PID 1308 wrote to memory of 3428 1308 7dc59989f2d0775bb83c499047a1d626.exe 42 PID 1308 wrote to memory of 3428 1308 7dc59989f2d0775bb83c499047a1d626.exe 42 PID 1308 wrote to memory of 3428 1308 7dc59989f2d0775bb83c499047a1d626.exe 42 PID 1308 wrote to memory of 3428 1308 7dc59989f2d0775bb83c499047a1d626.exe 42 PID 1308 wrote to memory of 3428 1308 7dc59989f2d0775bb83c499047a1d626.exe 42
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\7dc59989f2d0775bb83c499047a1d626.exe"C:\Users\Admin\AppData\Local\Temp\7dc59989f2d0775bb83c499047a1d626.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\7dc59989f2d0775bb83c499047a1d626.exeC:\Users\Admin\AppData\Local\Temp\7dc59989f2d0775bb83c499047a1d626.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1308
-
-