Analysis
-
max time kernel
31s -
max time network
35s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30/06/2024, 12:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
thraxywaxy.exe
Resource
win10-20240404-en
5 signatures
150 seconds
General
-
Target
thraxywaxy.exe
-
Size
67.7MB
-
MD5
b3d0ef6fc8dc355c3a148cb525764d4d
-
SHA1
c6b2074bf3420ae87e1bdc8d06142ce64f82c079
-
SHA256
d26aab0090481d1574b23585ada561c89585a0d370b413ca8a326eb0a09d8d60
-
SHA512
8503cf68b21a006449e6714b820cdf3105d8fca6b1cbd4d9d1be917dc8129b0a7e52f32a84369f326d8eded40685e8af6e1cd6ae55e1aeadfcfe942706614206
-
SSDEEP
1572864:AYc12jESlHVCSuxLlQhmqpNxnvOJ+egZ1CBDlvQL:Tc2EoehQNxvpmlg
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4692 thraxywaxy.exe 4692 thraxywaxy.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe 4692 thraxywaxy.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4692 thraxywaxy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4692 thraxywaxy.exe 4692 thraxywaxy.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4692 wrote to memory of 4976 4692 thraxywaxy.exe 74 PID 4692 wrote to memory of 4976 4692 thraxywaxy.exe 74 PID 4976 wrote to memory of 1884 4976 cmd.exe 76 PID 4976 wrote to memory of 1884 4976 cmd.exe 76 PID 4976 wrote to memory of 4236 4976 cmd.exe 77 PID 4976 wrote to memory of 4236 4976 cmd.exe 77 PID 4976 wrote to memory of 3232 4976 cmd.exe 78 PID 4976 wrote to memory of 3232 4976 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\thraxywaxy.exe"C:\Users\Admin\AppData\Local\Temp\thraxywaxy.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\thraxywaxy.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\thraxywaxy.exe" MD53⤵PID:1884
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4236
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:3232
-
-