Analysis
-
max time kernel
167s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe
-
Size
408KB
-
MD5
e5a2e760372393bdeb52720dd1e29e5e
-
SHA1
9de576fb3682892294ecdf75f61b121c32b1af8d
-
SHA256
50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4
-
SHA512
0226a23c736c0ce81078d2bb4f4f609b4d581e7f7729a5c2076b7f06cad136ad624a71b81a1a3320bc943c4105614460791fc236d3c8f9345fc99ebb208f1544
-
SSDEEP
6144:l6ZpsEWPmCIxA5eMk090CI1vI+m8HxSCXH:lf69dCCI+JTH
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4864 set thread context of 4832 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe 81 PID 4864 set thread context of 0 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4832 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe 81 PID 4864 wrote to memory of 4832 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe 81 PID 4864 wrote to memory of 4832 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe 81 PID 4864 wrote to memory of 4832 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe 81 PID 4864 wrote to memory of 4832 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe 81 PID 4864 wrote to memory of 4832 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe 81 PID 4864 wrote to memory of 4832 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe 81 PID 4864 wrote to memory of 0 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe PID 4864 wrote to memory of 0 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe PID 4864 wrote to memory of 0 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe PID 4864 wrote to memory of 0 4864 50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe"C:\Users\Admin\AppData\Local\Temp\50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe"C:\Users\Admin\AppData\Local\Temp\50eb206ba2cd84d277ff3d8f99d4382c96a1f94a6a5913560c642beabdd98ac4.exe"2⤵PID:4832
-