Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe
Resource
win10v2004-20240426-en
General
-
Target
fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe
-
Size
711KB
-
MD5
6956630ee4efe1b3723f37e5c31bf569
-
SHA1
be0ed06ecd81d6782349cd2a8781596c52d4cd46
-
SHA256
fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1
-
SHA512
c7035fffbcbe070506bb36701edfe0466f02c1fa2904b12ba1f7072e69aee15a55e5317f54c4f3704c9f2fce1655b6c5524d2f288a60c8b56f9f8a7edceb6464
-
SSDEEP
12288:Ligd6+hkpstM13N91AzHvCCQXgRwggo7liW1eIe0H2lztV6Y+yaxXog8kFeXsLhg:+e6+hv+991AzPC2DlpiW1ApXottQpu
Malware Config
Signatures
-
Detects executables packed with SmartAssembly 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4080-4-0x000000001B3C0000-0x000000001B3DC000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exedescription pid process target process PID 4080 set thread context of 3880 4080 fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exedescription pid process target process PID 4080 wrote to memory of 3880 4080 fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe PID 4080 wrote to memory of 3880 4080 fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe PID 4080 wrote to memory of 3880 4080 fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe"C:\Users\Admin\AppData\Local\Temp\fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exeC:\Users\Admin\AppData\Local\Temp\fb240bd2e7625b10a5e3ee6e5531950995de28e67cc5f0e7787d955d04416bc1.exe2⤵PID:3880
-