Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe
-
Size
256KB
-
MD5
f3990f0acd0d232a0c0d3318844ac521
-
SHA1
238878d90a4036b262a1398b381960b154f4b794
-
SHA256
98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4
-
SHA512
e7fb0d44169b870100ce6186cbbcbcd6e6933f54c3f3098902db876f48bb42b6341c8d507e5f1754118b8f1d84822449a9d8e095ed47842af778f6e4e7cd78e7
-
SSDEEP
6144:ngGimrQpXGYck9PDIYzAbRAnGPKlXN06Mc:frQpX4k9PDIs6Rxifn
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1488 set thread context of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26 PID 1488 wrote to memory of 2032 1488 98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe"C:\Users\Admin\AppData\Local\Temp\98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exeC:\Users\Admin\AppData\Local\Temp\98cc135cbedd1add827ce2bc4ff6ef9e0cb8b26f6a214755dac4423f785b42c4.exe2⤵PID:2032
-