Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 08:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ab69674a7c5c632c6ab831e6b5fff7cc.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ab69674a7c5c632c6ab831e6b5fff7cc.exe
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
ab69674a7c5c632c6ab831e6b5fff7cc.exe
-
Size
248KB
-
MD5
ab69674a7c5c632c6ab831e6b5fff7cc
-
SHA1
3e6e626f620428e84978693c25f41514769c2709
-
SHA256
b65356ffe2480c8aa5464748cec3b19cda085ad7b7ce0fddb07b2b19b4537052
-
SHA512
a6b7bd74f84a9f6df136a46b48b006eb5895ddc6fc72f6b8cf17b069135baf1eab9a75a3c2789a4bdc5fec8843f776378f32ee5272c21bca3e484334b190af11
-
SSDEEP
6144:vQ9cTb5exHySnX1lzQ5/VLsOUshdIRMypR1HDqC:vBTbaLn7M5/ukVshWC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2240-3-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2240-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2240-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2240-16-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1184 set thread context of 2240 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 90 PID 2240 set thread context of 3668 2240 ab69674a7c5c632c6ab831e6b5fff7cc.exe 91 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3668 ab69674a7c5c632c6ab831e6b5fff7cc.exe 3668 ab69674a7c5c632c6ab831e6b5fff7cc.exe 3668 ab69674a7c5c632c6ab831e6b5fff7cc.exe 3668 ab69674a7c5c632c6ab831e6b5fff7cc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 2240 ab69674a7c5c632c6ab831e6b5fff7cc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2240 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 90 PID 1184 wrote to memory of 2240 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 90 PID 1184 wrote to memory of 2240 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 90 PID 1184 wrote to memory of 2240 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 90 PID 1184 wrote to memory of 2240 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 90 PID 1184 wrote to memory of 2240 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 90 PID 1184 wrote to memory of 2240 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 90 PID 1184 wrote to memory of 2240 1184 ab69674a7c5c632c6ab831e6b5fff7cc.exe 90 PID 2240 wrote to memory of 3668 2240 ab69674a7c5c632c6ab831e6b5fff7cc.exe 91 PID 2240 wrote to memory of 3668 2240 ab69674a7c5c632c6ab831e6b5fff7cc.exe 91 PID 2240 wrote to memory of 3668 2240 ab69674a7c5c632c6ab831e6b5fff7cc.exe 91 PID 2240 wrote to memory of 3668 2240 ab69674a7c5c632c6ab831e6b5fff7cc.exe 91 PID 2240 wrote to memory of 3668 2240 ab69674a7c5c632c6ab831e6b5fff7cc.exe 91 PID 2240 wrote to memory of 3668 2240 ab69674a7c5c632c6ab831e6b5fff7cc.exe 91 PID 2240 wrote to memory of 3668 2240 ab69674a7c5c632c6ab831e6b5fff7cc.exe 91 PID 3668 wrote to memory of 3384 3668 ab69674a7c5c632c6ab831e6b5fff7cc.exe 49 PID 3668 wrote to memory of 3384 3668 ab69674a7c5c632c6ab831e6b5fff7cc.exe 49 PID 3668 wrote to memory of 3384 3668 ab69674a7c5c632c6ab831e6b5fff7cc.exe 49 PID 3668 wrote to memory of 3384 3668 ab69674a7c5c632c6ab831e6b5fff7cc.exe 49
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\ab69674a7c5c632c6ab831e6b5fff7cc.exe"C:\Users\Admin\AppData\Local\Temp\ab69674a7c5c632c6ab831e6b5fff7cc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\ab69674a7c5c632c6ab831e6b5fff7cc.exeC:\Users\Admin\AppData\Local\Temp\ab69674a7c5c632c6ab831e6b5fff7cc.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\ab69674a7c5c632c6ab831e6b5fff7cc.exeC:\Users\Admin\AppData\Local\Temp\ab69674a7c5c632c6ab831e6b5fff7cc.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3668
-
-
-