Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 07:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e-dekont.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e-dekont.exe
Resource
win10v2004-20240226-en
7 signatures
150 seconds
General
-
Target
e-dekont.exe
-
Size
916KB
-
MD5
f16a453a7db95634f924bed9463d6b02
-
SHA1
b02be42a5d1d67c891cc30577a159f4fdd5fbf6e
-
SHA256
54a4891d6753b4acaa07bb6c01aebcb44a0140ffc05ccdc53785a74365969585
-
SHA512
bf5f5b5971a24e4e9f8b0e748bab1cdc81016f2f179781fc399b877b529be7392f671c840e3aedf13a0d60954083002a27bca29335815d2bf299a42c99f791b8
-
SSDEEP
24576:XKCcwQs06lgDAd6LpSqaDuaWJfy9JOJb:XKqQsJwAdaY45yu
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1948 set thread context of 2604 1948 e-dekont.exe 28 PID 2604 set thread context of 1172 2604 e-dekont.exe 21 PID 2604 set thread context of 2972 2604 e-dekont.exe 31 PID 2972 set thread context of 1172 2972 tasklist.exe 21 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2972 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2604 e-dekont.exe 2604 e-dekont.exe 2604 e-dekont.exe 2604 e-dekont.exe 2604 e-dekont.exe 2604 e-dekont.exe 2604 e-dekont.exe 2604 e-dekont.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe 2972 tasklist.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2604 e-dekont.exe 1172 Explorer.EXE 1172 Explorer.EXE 2972 tasklist.exe 2972 tasklist.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2604 1948 e-dekont.exe 28 PID 1948 wrote to memory of 2604 1948 e-dekont.exe 28 PID 1948 wrote to memory of 2604 1948 e-dekont.exe 28 PID 1948 wrote to memory of 2604 1948 e-dekont.exe 28 PID 1948 wrote to memory of 2604 1948 e-dekont.exe 28 PID 1948 wrote to memory of 2604 1948 e-dekont.exe 28 PID 1948 wrote to memory of 2604 1948 e-dekont.exe 28 PID 1172 wrote to memory of 2972 1172 Explorer.EXE 31 PID 1172 wrote to memory of 2972 1172 Explorer.EXE 31 PID 1172 wrote to memory of 2972 1172 Explorer.EXE 31 PID 1172 wrote to memory of 2972 1172 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\e-dekont.exe"C:\Users\Admin\AppData\Local\Temp\e-dekont.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\e-dekont.exe"C:\Users\Admin\AppData\Local\Temp\e-dekont.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2604
-
-
-
C:\Windows\SysWOW64\tasklist.exe"C:\Windows\SysWOW64\tasklist.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates processes with tasklist
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2972
-