Analysis
-
max time kernel
146s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 13:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
FedEx_2341002842.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
FedEx_2341002842.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
FedEx_2341002842.exe
-
Size
724KB
-
MD5
33e8a6fafc9f36767f9fbd7e99782ad6
-
SHA1
2954f4ba4b0ff30136fa6286393f3e87226c4933
-
SHA256
eb7783866d9b334463e873a5053ac1d8cf7deb36a23e5cc52fe3a42566b4ecd8
-
SHA512
084754a73f37c7c6dfd8c1505072c814d9722a8cfd44fdb3fc614bc4a337fd31c265afb5754ceb6f6ebf7d977a31a017287785d7b6b7a69661ec5d1afab6dcc5
-
SSDEEP
12288:jSmPwRYnOELz89oRIlSw5RjUGgWD2Uzx+vF6iqlrsRlT0q25Ulc2w/nyOoB4qfDb:jSmP0Y74oRIlSsjR2UV+vdql4RCOFw/K
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2348 set thread context of 2344 2348 FedEx_2341002842.exe 29 PID 2344 set thread context of 1192 2344 FedEx_2341002842.exe 10 PID 2344 set thread context of 1016 2344 FedEx_2341002842.exe 30 PID 1016 set thread context of 1192 1016 proquota.exe 10 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2348 FedEx_2341002842.exe 2344 FedEx_2341002842.exe 2344 FedEx_2341002842.exe 2344 FedEx_2341002842.exe 2344 FedEx_2341002842.exe 2344 FedEx_2341002842.exe 2344 FedEx_2341002842.exe 2344 FedEx_2341002842.exe 2344 FedEx_2341002842.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe 1016 proquota.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2344 FedEx_2341002842.exe 1192 Explorer.EXE 1192 Explorer.EXE 1016 proquota.exe 1016 proquota.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2348 FedEx_2341002842.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2644 2348 FedEx_2341002842.exe 28 PID 2348 wrote to memory of 2644 2348 FedEx_2341002842.exe 28 PID 2348 wrote to memory of 2644 2348 FedEx_2341002842.exe 28 PID 2348 wrote to memory of 2644 2348 FedEx_2341002842.exe 28 PID 2348 wrote to memory of 2344 2348 FedEx_2341002842.exe 29 PID 2348 wrote to memory of 2344 2348 FedEx_2341002842.exe 29 PID 2348 wrote to memory of 2344 2348 FedEx_2341002842.exe 29 PID 2348 wrote to memory of 2344 2348 FedEx_2341002842.exe 29 PID 2348 wrote to memory of 2344 2348 FedEx_2341002842.exe 29 PID 2348 wrote to memory of 2344 2348 FedEx_2341002842.exe 29 PID 2348 wrote to memory of 2344 2348 FedEx_2341002842.exe 29 PID 1192 wrote to memory of 1016 1192 Explorer.EXE 30 PID 1192 wrote to memory of 1016 1192 Explorer.EXE 30 PID 1192 wrote to memory of 1016 1192 Explorer.EXE 30 PID 1192 wrote to memory of 1016 1192 Explorer.EXE 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\FedEx_2341002842.exe"C:\Users\Admin\AppData\Local\Temp\FedEx_2341002842.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\FedEx_2341002842.exe"C:\Users\Admin\AppData\Local\Temp\FedEx_2341002842.exe"3⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\FedEx_2341002842.exe"C:\Users\Admin\AppData\Local\Temp\FedEx_2341002842.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2344
-
-
-
C:\Windows\SysWOW64\proquota.exe"C:\Windows\SysWOW64\proquota.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1016
-