Analysis
-
max time kernel
187s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe
Resource
win10v2004-20220812-en
General
-
Target
52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe
-
Size
96KB
-
MD5
8281f0ba623335dbb36bdb8ac2970592
-
SHA1
c4f78d37b5cd86f22491ffae009b0739e6b657d1
-
SHA256
52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5
-
SHA512
a2c373d0a6c178d6a36831ed790cc4d509ad80267783f11cd6c55cf29b5c66a5c049593260047b35b28a7e6811aea51e77a3965bb5c4cf09b668cc476c29c2fe
-
SSDEEP
1536:HIFh0hhDf4LHiuw21U2GOxvc/AQmT5Dx9Tyq+jDeTL1W5Tl664CNAG:f7DfcF1U2dxvxDx9T3+56dCqG
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2272-133-0x0000000000400000-0x0000000002728000-memory.dmp upx behavioral2/memory/2272-136-0x0000000000400000-0x0000000002728000-memory.dmp upx behavioral2/memory/2272-137-0x0000000000400000-0x0000000002728000-memory.dmp upx behavioral2/memory/2272-138-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3148 set thread context of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3148 wrote to memory of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80 PID 3148 wrote to memory of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80 PID 3148 wrote to memory of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80 PID 3148 wrote to memory of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80 PID 3148 wrote to memory of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80 PID 3148 wrote to memory of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80 PID 3148 wrote to memory of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80 PID 3148 wrote to memory of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80 PID 3148 wrote to memory of 2272 3148 52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe"C:\Users\Admin\AppData\Local\Temp\52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exeC:\Users\Admin\AppData\Local\Temp\52dfc564b18864ee360bc66e2c1f70fa9439df7175d26b813917ec2867a774d5.exe2⤵PID:2272
-