Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 02:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b329aa1bb05795256da90c44cf323f7c.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b329aa1bb05795256da90c44cf323f7c.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
b329aa1bb05795256da90c44cf323f7c.exe
-
Size
188KB
-
MD5
b329aa1bb05795256da90c44cf323f7c
-
SHA1
a842b47507b8b54f60e2ab33891d20eabd788228
-
SHA256
35c1343b193b016edcd1d81824358ee37ccf82e00ae6cf05732ee5b3c001d157
-
SHA512
402116ef03556c0335927e76ea2ec0156a150a0cfb2e439236e63dc64e9c82ab20162977187688a242938b25026916189c50341bbcf4c23935b332fe0645befc
-
SSDEEP
3072:v+WL5B1MmWgWUP6jM7KJa/nObeYtXW7l1v2S5:DLlMmMra/nObeymJQ
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b329aa1bb05795256da90c44cf323f7c.exedescription pid process target process PID 3368 set thread context of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
b329aa1bb05795256da90c44cf323f7c.exepid process 2844 b329aa1bb05795256da90c44cf323f7c.exe 2844 b329aa1bb05795256da90c44cf323f7c.exe 2844 b329aa1bb05795256da90c44cf323f7c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b329aa1bb05795256da90c44cf323f7c.exedescription pid process Token: SeDebugPrivilege 2844 b329aa1bb05795256da90c44cf323f7c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
b329aa1bb05795256da90c44cf323f7c.exepid process 3368 b329aa1bb05795256da90c44cf323f7c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b329aa1bb05795256da90c44cf323f7c.exedescription pid process target process PID 3368 wrote to memory of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe PID 3368 wrote to memory of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe PID 3368 wrote to memory of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe PID 3368 wrote to memory of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe PID 3368 wrote to memory of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe PID 3368 wrote to memory of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe PID 3368 wrote to memory of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe PID 3368 wrote to memory of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe PID 3368 wrote to memory of 2844 3368 b329aa1bb05795256da90c44cf323f7c.exe b329aa1bb05795256da90c44cf323f7c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b329aa1bb05795256da90c44cf323f7c.exe"C:\Users\Admin\AppData\Local\Temp\b329aa1bb05795256da90c44cf323f7c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\b329aa1bb05795256da90c44cf323f7c.exe"C:\Users\Admin\AppData\Local\Temp\b329aa1bb05795256da90c44cf323f7c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-