Analysis
-
max time kernel
98s -
max time network
144s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
31-10-2024 08:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
example.exe
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
5 signatures
150 seconds
General
-
Target
example.exe
-
Size
47KB
-
MD5
c6dd590bef5e5baa2dea6ab07080da4e
-
SHA1
9aaee146e37a67498631350ff3a152dc0177d68a
-
SHA256
44fb7552282fa3d1b429ec670a43a1c3e13a59725ffb8ddfdcb9de6c955b7bb5
-
SHA512
1df3491cc52042d583afbfbf0ee5d464c518d5c03f8ec0830a9a5182a4462f153917f2ffd42e6abf3121530762797d592411be304db34eae24907027519a15ab
-
SSDEEP
768:GtpfgdIk3jT0loIusLtEz710dndLGkAv5vRfjHDN:Gt54nT0la710dndgvRfHN
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 4 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2404 set thread context of 3032 2404 example.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3032 example.exe 3032 example.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3032 example.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3532 2404 example.exe 84 PID 2404 wrote to memory of 3532 2404 example.exe 84 PID 3532 wrote to memory of 4244 3532 cmd.exe 85 PID 3532 wrote to memory of 4244 3532 cmd.exe 85 PID 2404 wrote to memory of 3032 2404 example.exe 87 PID 2404 wrote to memory of 3032 2404 example.exe 87 PID 2404 wrote to memory of 3032 2404 example.exe 87 PID 2404 wrote to memory of 3032 2404 example.exe 87 PID 2404 wrote to memory of 3032 2404 example.exe 87 PID 2404 wrote to memory of 3032 2404 example.exe 87 PID 2404 wrote to memory of 3032 2404 example.exe 87 PID 2404 wrote to memory of 3032 2404 example.exe 87 PID 2404 wrote to memory of 3032 2404 example.exe 87 PID 2404 wrote to memory of 3032 2404 example.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\example.exe"C:\Users\Admin\AppData\Local\Temp\example.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con cols=55 lines=152⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\mode.commode con cols=55 lines=153⤵PID:4244
-
-
-
C:\Users\Admin\AppData\Local\Temp\example.exeC:\Users\Admin\AppData\Local\Temp\example.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-