Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe
Resource
win10v2004-20240508-en
General
-
Target
a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe
-
Size
1.1MB
-
MD5
494d46b06be2512d5224dcbb309cc9c8
-
SHA1
8b2ff6a1c15a9b0e0f1700d449040d6177ed0456
-
SHA256
a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a
-
SHA512
80a2c2466845f59d311efe7cea463f219062d08f542e2de1f796e181bbd9826b4fd46cb5ff769e6cf9b6cd7ec7a0e8a5413b6d12e19a21dc268b81da38aaa67d
-
SSDEEP
24576:FAHnh+eWsN3skA4RV1Hom2KXMmHa7tlktThsYldX5:0h+ZkldoPK8Ya7/kx/l7
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1088 set thread context of 2700 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe 28 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2700 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe 28 PID 1088 wrote to memory of 2700 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe 28 PID 1088 wrote to memory of 2700 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe 28 PID 1088 wrote to memory of 2700 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe 28 PID 1088 wrote to memory of 2700 1088 a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe"C:\Users\Admin\AppData\Local\Temp\a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a9d81d4d219333b4aae2743cb1b2ddb1f13c6182c773bae002ad26db214a054a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD56417747445bc858fbf9bd204c824ad00
SHA1ec17dedfeca8ef363d1285f5c2416fd5c3cbc7bb
SHA256ceb41f7016a5b596fde72f9cd032707a7e0d9d6a7e9bb890e493f340057660b5
SHA512bf3dfe6f149783035f2f0269c99f0ea5f0c1233d7226ccfb896f0d03e5239afec4cce3f6f4a69f5f6dadcb6e020c3756c9df03ecbac4bccd8796b97eadcaa59b