Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 16:48
Behavioral task
behavioral1
Sample
09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe
Resource
win7-20240705-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe
-
Size
6.5MB
-
MD5
39bf30dc028cd447bdc8d2e503bc8c16
-
SHA1
bce8953e0cb79c4a12dc56a392f399ad356a12ce
-
SHA256
09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc
-
SHA512
84176b5430ba76739f5f552cd25ffa61092a9ed3bc3ab2f1fca9b6984713a1cc77eff56d7951b30a09bf389e35cef4313016dafad57d4f195eefda4b9ab641fa
-
SSDEEP
98304:mXgJFkOtn0reUitQFhWEPvPBt2ZPDhR7vzn2r77TfL7bGlZYZAVs6hia:tuOtEgTGvWPDh5zUPficZAVsSi
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4580-35-0x0000000140000000-0x0000000140C5D000-memory.dmp vmprotect behavioral2/memory/4580-32-0x0000000140000000-0x0000000140C5D000-memory.dmp vmprotect behavioral2/memory/4580-39-0x0000000140000000-0x0000000140C5D000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4580 09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4580 09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe 4580 09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe 4580 09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe 4580 09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe 4580 09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe 4580 09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2984 4580 09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe 88 PID 4580 wrote to memory of 2984 4580 09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe"C:\Users\Admin\AppData\Local\Temp\09f5aa0ab9d1a4ae3b24ecb110b578cfee025a159def8e744c7245587b75d3bc.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:2984
-