Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe
Resource
win10v2004-20240412-en
General
-
Target
bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe
-
Size
765KB
-
MD5
111a71fb5c4146aedab7ef82ee65ff9e
-
SHA1
7d13ad097ac1ff48956780b1c367c48139a3f4a5
-
SHA256
bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9
-
SHA512
f79d58ba69f911fdc8a00575ad495a532d687a2e26b3836a3eab276911adc82c59d5141e0da0eada8afba9c85d74090e2f7fb706685b823515653fd0804bc0cd
-
SSDEEP
12288:oI2iNXxPga6O7fCIpmCVcyaERR/NEAO15ykGS6uPr33k5c:oI1PPgmKqSZ8/NEAe5LGRir336
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2192 set thread context of 2984 2192 bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe 28 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2984 2192 bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe 28 PID 2192 wrote to memory of 2984 2192 bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe 28 PID 2192 wrote to memory of 2984 2192 bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe 28 PID 2192 wrote to memory of 2984 2192 bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe"C:\Users\Admin\AppData\Local\Temp\bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exeC:\Users\Admin\AppData\Local\Temp\bb7b0861f93da2461b84546e0702d9c628b49f429b7e483284093f542b4113e9.exe2⤵PID:2984
-