Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 12:01
Static task
static1
Behavioral task
behavioral1
Sample
358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe
-
Size
394KB
-
MD5
7fcbff331b40e7edcd4985a65a9ab621
-
SHA1
9f420992112f832fbada4b258aa9132f2f4e798d
-
SHA256
358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca
-
SHA512
1fd41c11bd30962be2421a08175797d9da83c98dc7f0424fdfea92bb3fd8ddd316e40a57944d56e72aeeb19809720fadd1c89c2affb3c87ba89ef754b24a2576
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exedescription pid process target process PID 624 set thread context of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exepid process 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exedescription pid process target process PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe PID 624 wrote to memory of 1496 624 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe 358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe"C:\Users\Admin\AppData\Local\Temp\358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe"C:\Users\Admin\AppData\Local\Temp\358a5079b824548ef87fcf89d3e4b5284e780edc4de8a450f3e51878d1290eca.exe"2⤵PID:1496
-