Analysis
-
max time kernel
163s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 07:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
98e458a08253a88148baf9396806ac6f.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
98e458a08253a88148baf9396806ac6f.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
98e458a08253a88148baf9396806ac6f.exe
-
Size
6.4MB
-
MD5
98e458a08253a88148baf9396806ac6f
-
SHA1
a0403979206da80f9ce14f9e8809a86d0274c514
-
SHA256
25fd38337f6d510e365bba8265437d24bb9776c11dbdbe35cd1979856a1f0cfc
-
SHA512
e9adad9b5a7415973347cf3d0cc401124e469a870c38ce034b3034db5073e883011c8a4f4899398540707a551657c8a2db3a348bb1e9f9b7ce986e3d158eb68f
-
SSDEEP
98304:FzeoDRJ/WoD1rHz2/U/nlpsuaZXK6y0igIDO:te0Jvz2/+OHyNgp
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3760 set thread context of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2052 98e458a08253a88148baf9396806ac6f.exe 2052 98e458a08253a88148baf9396806ac6f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2052 98e458a08253a88148baf9396806ac6f.exe 2052 98e458a08253a88148baf9396806ac6f.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86 PID 3760 wrote to memory of 2052 3760 98e458a08253a88148baf9396806ac6f.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\98e458a08253a88148baf9396806ac6f.exe"C:\Users\Admin\AppData\Local\Temp\98e458a08253a88148baf9396806ac6f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\98e458a08253a88148baf9396806ac6f.exe"C:\Users\Admin\AppData\Local\Temp\98e458a08253a88148baf9396806ac6f.exe" ""2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2052
-