Analysis
-
max time kernel
135s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe
Resource
win10v2004-20220812-en
General
-
Target
8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe
-
Size
600KB
-
MD5
00d09c294c5658c41e812685632261d0
-
SHA1
0bbfab2698dd039ad0c05632fc6bf4bfe18c4235
-
SHA256
8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd
-
SHA512
948c072d8a4bf529636bf75c66e4ac8ed679ae742b6ccd511a303d036286ef771d6ea4b1c7e631bc13c9a9c7720fbbfca85b4739391cf363451e7395f875163d
-
SSDEEP
3072:4UdeBBBBBBBBBBBMHegaGZMQGEgRC37syrRYX7mONhwMaEEHXjZV0FxQor6uW6ji:/fPZVCxQorM6jYp1aPFMcP0
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1712 set thread context of 8 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe 80 PID 1712 set thread context of 0 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1712 wrote to memory of 8 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe 80 PID 1712 wrote to memory of 8 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe 80 PID 1712 wrote to memory of 8 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe 80 PID 1712 wrote to memory of 8 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe 80 PID 1712 wrote to memory of 8 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe 80 PID 1712 wrote to memory of 8 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe 80 PID 1712 wrote to memory of 8 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe 80 PID 1712 wrote to memory of 0 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe PID 1712 wrote to memory of 0 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe PID 1712 wrote to memory of 0 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe PID 1712 wrote to memory of 0 1712 8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe"C:\Users\Admin\AppData\Local\Temp\8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe"C:\Users\Admin\AppData\Local\Temp\8e9b0460a8ae0b491b0913f1de689d757b54a9a938a3be7a497761e358d4a8dd.exe"2⤵PID:8
-