Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 17:39
Behavioral task
behavioral1
Sample
a9c3389859e35fa20cb60a9339410045.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a9c3389859e35fa20cb60a9339410045.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
a9c3389859e35fa20cb60a9339410045.exe
-
Size
175KB
-
MD5
a9c3389859e35fa20cb60a9339410045
-
SHA1
721afb881102c018118729d52a5412a7091576bb
-
SHA256
af490e70dd036d023814ead3fbf3a7610fc400553b56e0783aadf72a6b04742c
-
SHA512
a267c9b6983b39d9afb61f7ab014163f1df7afed5eaf82f54711b65498bf1c208a88db37d22e204ca56cdc94373b7b11b54dbe0bc3f5cd66d31f812f324f7e6b
-
SSDEEP
3072:pXK1MsXkiMIUelDdWffOpvoZ2XXBNGYthkpWRUQVcikjEistIDP4nvubyZKica+6:dTinpUHOuZ2XXBNhfkpAU7Fs+QGupc
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4448-0-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral2/memory/4448-1-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral2/memory/4448-2-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral2/memory/4448-9-0x0000000000400000-0x0000000000479000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4448 set thread context of 2824 4448 a9c3389859e35fa20cb60a9339410045.exe 87 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4448 a9c3389859e35fa20cb60a9339410045.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4448 wrote to memory of 2824 4448 a9c3389859e35fa20cb60a9339410045.exe 87 PID 4448 wrote to memory of 2824 4448 a9c3389859e35fa20cb60a9339410045.exe 87 PID 4448 wrote to memory of 2824 4448 a9c3389859e35fa20cb60a9339410045.exe 87 PID 4448 wrote to memory of 2824 4448 a9c3389859e35fa20cb60a9339410045.exe 87 PID 4448 wrote to memory of 2824 4448 a9c3389859e35fa20cb60a9339410045.exe 87 PID 4448 wrote to memory of 2824 4448 a9c3389859e35fa20cb60a9339410045.exe 87 PID 4448 wrote to memory of 2824 4448 a9c3389859e35fa20cb60a9339410045.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9c3389859e35fa20cb60a9339410045.exe"C:\Users\Admin\AppData\Local\Temp\a9c3389859e35fa20cb60a9339410045.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\a9c3389859e35fa20cb60a9339410045.exeC:\Users\Admin\AppData\Local\Temp\a9c3389859e35fa20cb60a9339410045.exe2⤵PID:2824
-