Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 13:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8c7a1c86447710a1cc131d841f0c7f98.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
8c7a1c86447710a1cc131d841f0c7f98.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
8c7a1c86447710a1cc131d841f0c7f98.exe
-
Size
81KB
-
MD5
8c7a1c86447710a1cc131d841f0c7f98
-
SHA1
0f9ae93d8962305a8eaf32e31c4f72371c0f1b74
-
SHA256
6551f24f8f2777cedd92ed496d8df7b5f77feb5efeeab3ed74faae3f71831150
-
SHA512
be158655e69b23f180ec477e95f235b5219bad5baf84ab87e78608e16f731a335851fe4a4050f4d8f4fd56bbeaafbcac3ebd2dc5ddd3645254164e33341a91f3
-
SSDEEP
768:Ahx17OOWK3oy4uO8zfWAZVV5OQNchmt590f9GsfH5dnXo+L/jAY:geOdY7UzpryQ7tb01GshBXBLr
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\odttooiyyt.exe 8c7a1c86447710a1cc131d841f0c7f98.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\odttooiyyt.exe 8c7a1c86447710a1cc131d841f0c7f98.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 2172 2844 8c7a1c86447710a1cc131d841f0c7f98.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2172 8c7a1c86447710a1cc131d841f0c7f98.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2172 2844 8c7a1c86447710a1cc131d841f0c7f98.exe 28 PID 2844 wrote to memory of 2172 2844 8c7a1c86447710a1cc131d841f0c7f98.exe 28 PID 2844 wrote to memory of 2172 2844 8c7a1c86447710a1cc131d841f0c7f98.exe 28 PID 2844 wrote to memory of 2172 2844 8c7a1c86447710a1cc131d841f0c7f98.exe 28 PID 2844 wrote to memory of 2172 2844 8c7a1c86447710a1cc131d841f0c7f98.exe 28 PID 2844 wrote to memory of 2172 2844 8c7a1c86447710a1cc131d841f0c7f98.exe 28 PID 2172 wrote to memory of 1208 2172 8c7a1c86447710a1cc131d841f0c7f98.exe 17 PID 2172 wrote to memory of 1208 2172 8c7a1c86447710a1cc131d841f0c7f98.exe 17 PID 2172 wrote to memory of 1208 2172 8c7a1c86447710a1cc131d841f0c7f98.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\8c7a1c86447710a1cc131d841f0c7f98.exe"C:\Users\Admin\AppData\Local\Temp\8c7a1c86447710a1cc131d841f0c7f98.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\8c7a1c86447710a1cc131d841f0c7f98.exe"C:\Users\Admin\AppData\Local\Temp\8c7a1c86447710a1cc131d841f0c7f98.exe"3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172
-
-