Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 19:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a72f659fd970d503ac88a81066e58c25.exe
Resource
win7-20240221-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
a72f659fd970d503ac88a81066e58c25.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
a72f659fd970d503ac88a81066e58c25.exe
-
Size
281KB
-
MD5
a72f659fd970d503ac88a81066e58c25
-
SHA1
42b015e9fc6f444afe513245a348568366b02c46
-
SHA256
c61409a910ee60ac110a326e4fee3a8609f50d4e072e760ea66c15a1584de855
-
SHA512
a2500f1d439753e9e53d2bca24ab608915eb75126e31247ae4858e7b62878335cacef8ea4c8c21c38213fdffb5c7b61987391393e90e9e96c0cb55a613fc2d75
-
SSDEEP
6144:Ib9kSqoncIHgp44tKAkG0nyaSDVR2r7flZNgpmPuIft6nv79/Ji:AhqoLb4tKAcRSDVRKjlZNgAue
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a72f659fd970d503ac88a81066e58c25.exedescription pid process target process PID 3236 set thread context of 1832 3236 a72f659fd970d503ac88a81066e58c25.exe a72f659fd970d503ac88a81066e58c25.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a72f659fd970d503ac88a81066e58c25.exedescription pid process target process PID 3236 wrote to memory of 1832 3236 a72f659fd970d503ac88a81066e58c25.exe a72f659fd970d503ac88a81066e58c25.exe PID 3236 wrote to memory of 1832 3236 a72f659fd970d503ac88a81066e58c25.exe a72f659fd970d503ac88a81066e58c25.exe PID 3236 wrote to memory of 1832 3236 a72f659fd970d503ac88a81066e58c25.exe a72f659fd970d503ac88a81066e58c25.exe PID 3236 wrote to memory of 1832 3236 a72f659fd970d503ac88a81066e58c25.exe a72f659fd970d503ac88a81066e58c25.exe PID 3236 wrote to memory of 1832 3236 a72f659fd970d503ac88a81066e58c25.exe a72f659fd970d503ac88a81066e58c25.exe PID 3236 wrote to memory of 1832 3236 a72f659fd970d503ac88a81066e58c25.exe a72f659fd970d503ac88a81066e58c25.exe PID 3236 wrote to memory of 1832 3236 a72f659fd970d503ac88a81066e58c25.exe a72f659fd970d503ac88a81066e58c25.exe PID 3236 wrote to memory of 1832 3236 a72f659fd970d503ac88a81066e58c25.exe a72f659fd970d503ac88a81066e58c25.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a72f659fd970d503ac88a81066e58c25.exe"C:\Users\Admin\AppData\Local\Temp\a72f659fd970d503ac88a81066e58c25.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a72f659fd970d503ac88a81066e58c25.exe"C:\Users\Admin\AppData\Local\Temp\a72f659fd970d503ac88a81066e58c25.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1832-2-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1832-4-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1832-5-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1832-6-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/3236-0-0x00000000005D0000-0x00000000005D8000-memory.dmpFilesize
32KB
-
memory/3236-1-0x00000000005D0000-0x00000000005D8000-memory.dmpFilesize
32KB