Analysis
-
max time kernel
2s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 09:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
emogod.exe
Resource
win10v2004-20240508-en
3 signatures
600 seconds
General
-
Target
emogod.exe
-
Size
12.3MB
-
MD5
83920bf1d630fb9075c1ba0357368296
-
SHA1
38633f9249724bf1667a80c1c494e6e63a0b8930
-
SHA256
344e31f422adef7c563215c0d2e92ddd53f859f9a9cb0244543f19013a72de67
-
SHA512
426458008c9eb9072927408840c9c7d88fd436c94d5613a4980fd936610aeaff3b6049c83f722398a6fc12999d04ea3007cfd1094e9ee047484a7263975fda2e
-
SSDEEP
196608:dRkufRNuDpmmjZ/9KmklLfDl7nCvBaR44PsnSmB01GryS6587Q3Ov3am:daSufdwFRQsRHfmxN65IQez
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1124 emogod.exe 1124 emogod.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1124 emogod.exe 1124 emogod.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1124 wrote to memory of 4128 1124 emogod.exe 83 PID 1124 wrote to memory of 4128 1124 emogod.exe 83 PID 4128 wrote to memory of 4300 4128 cmd.exe 84 PID 4128 wrote to memory of 4300 4128 cmd.exe 84 PID 1124 wrote to memory of 3628 1124 emogod.exe 85 PID 1124 wrote to memory of 3628 1124 emogod.exe 85 PID 3628 wrote to memory of 1648 3628 cmd.exe 86 PID 3628 wrote to memory of 1648 3628 cmd.exe 86 PID 3628 wrote to memory of 1420 3628 cmd.exe 87 PID 3628 wrote to memory of 1420 3628 cmd.exe 87 PID 3628 wrote to memory of 3940 3628 cmd.exe 88 PID 3628 wrote to memory of 3940 3628 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\emogod.exe"C:\Users\Admin\AppData\Local\Temp\emogod.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode 60,202⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\system32\mode.commode 60,203⤵PID:4300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\emogod.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\emogod.exe" MD53⤵PID:1648
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1420
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:3940
-
-