Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 01:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
95df89e39fab135226796f671f5bf3f0.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
95df89e39fab135226796f671f5bf3f0.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
95df89e39fab135226796f671f5bf3f0.exe
-
Size
153KB
-
MD5
95df89e39fab135226796f671f5bf3f0
-
SHA1
3f7c6d7398d8bf2b3a3cfd666fd615b155dd8616
-
SHA256
a57422e47424e8632033ca1bd138f5228e0367ab11d139bdf35cf15d38fd04ba
-
SHA512
4d55d5d3e84bfd4c49fe700038828a6c34dad7c337337b933a3e246417e63508c9f5f69ee80561e96375b11a3ffd166e1cca41687a01303b08503b1c0509e2b9
-
SSDEEP
3072:b6h2ZdVFdEdP2RPSlab/v1Lrst/Z7rhfhTBfeT/khFiHG9aRn8nDiC99E:I2hMPizQt/ZdhTBhAH6aGDtU
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Unit-K.dll 95df89e39fab135226796f671f5bf3f0.exe File opened for modification C:\Windows\SysWOW64\Unit-K.dll 95df89e39fab135226796f671f5bf3f0.exe File created C:\Windows\SysWOW64\Unit-W.dll 95df89e39fab135226796f671f5bf3f0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2092 set thread context of 2772 2092 95df89e39fab135226796f671f5bf3f0.exe 28 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 95df89e39fab135226796f671f5bf3f0.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2772 95df89e39fab135226796f671f5bf3f0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2772 95df89e39fab135226796f671f5bf3f0.exe 2772 95df89e39fab135226796f671f5bf3f0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2772 2092 95df89e39fab135226796f671f5bf3f0.exe 28 PID 2092 wrote to memory of 2772 2092 95df89e39fab135226796f671f5bf3f0.exe 28 PID 2092 wrote to memory of 2772 2092 95df89e39fab135226796f671f5bf3f0.exe 28 PID 2092 wrote to memory of 2772 2092 95df89e39fab135226796f671f5bf3f0.exe 28 PID 2092 wrote to memory of 2772 2092 95df89e39fab135226796f671f5bf3f0.exe 28 PID 2092 wrote to memory of 2772 2092 95df89e39fab135226796f671f5bf3f0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\95df89e39fab135226796f671f5bf3f0.exe"C:\Users\Admin\AppData\Local\Temp\95df89e39fab135226796f671f5bf3f0.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\95df89e39fab135226796f671f5bf3f0.exeC:\Users\Admin\AppData\Local\Temp\95df89e39fab135226796f671f5bf3f0.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2772
-