Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe
Resource
win10v2004-20240419-en
General
-
Target
8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe
-
Size
1.2MB
-
MD5
2b5917ada9ef1cef3713977421874f68
-
SHA1
fb74e9a12166950199edc891c59bea4069edcd1c
-
SHA256
8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6
-
SHA512
1e2c1cab61d86da2d4354a771a4eebb5221c47c09581e499d1e20211ca2e63a900992d829161b77d3231b7e09122411dfa195bf35cf82cf68d94490c9cab6008
-
SSDEEP
24576:jqDEvCTbMWu7rQYlBQcBiT6rprG8a/J0EhYslvrhI6cI:jTvC/MTQYxsWR7a/J0Eas9Iz
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1776 set thread context of 3040 1776 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 28 PID 3040 set thread context of 1184 3040 svchost.exe 21 PID 3040 set thread context of 2404 3040 svchost.exe 29 PID 2404 set thread context of 1184 2404 finger.exe 21 -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe 2404 finger.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1776 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 3040 svchost.exe 1184 Explorer.EXE 1184 Explorer.EXE 2404 finger.exe 2404 finger.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1776 wrote to memory of 3040 1776 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 28 PID 1776 wrote to memory of 3040 1776 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 28 PID 1776 wrote to memory of 3040 1776 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 28 PID 1776 wrote to memory of 3040 1776 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 28 PID 1776 wrote to memory of 3040 1776 8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe 28 PID 1184 wrote to memory of 2404 1184 Explorer.EXE 29 PID 1184 wrote to memory of 2404 1184 Explorer.EXE 29 PID 1184 wrote to memory of 2404 1184 Explorer.EXE 29 PID 1184 wrote to memory of 2404 1184 Explorer.EXE 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe"C:\Users\Admin\AppData\Local\Temp\8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8fd32227ca310727137c28a5945497447ab479bd074d064ee11a6545d5eef5d6.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3040
-
-
-
C:\Windows\SysWOW64\finger.exe"C:\Windows\SysWOW64\finger.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2404
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD501cbc578c30426a9213885b2c7976328
SHA16cf0e0935f3464b676b308a0c4bbeb06d8eb2f4c
SHA2568d208a375a96923985a66f18d0a6d646064851528b707f75e38128c1b66e6e46
SHA5120cebf7f1d711a0b766cff83995ededde42bc2b8d4543ba890f603c01ca962a61d538b2f28bdaa85c032780ed875deee85ccd39870cc17e72a5199b273f98b573