Analysis
-
max time kernel
33s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 04:40
Static task
static1
Behavioral task
behavioral1
Sample
3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe
Resource
win10v2004-20220812-en
General
-
Target
3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe
-
Size
460KB
-
MD5
8070bb4bbdf774783f64fc56a91bae2a
-
SHA1
1db7acd841a7032b09a0194f830f1de89101af2a
-
SHA256
3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee
-
SHA512
58d907e247c58a2bab83862e189b34aa5690deaa66462f8b60d3b3e5aa237ce92891254a353533f283f118a2ed87d5435bbe927b49b84e9e98b35c2c39b66930
-
SSDEEP
12288:uA7+bLQTE/0/6+N3AjIYZ/AgCRvBj7hnwG0feYStd1d+:uFbLaE/wtN3AjIYZ/AgCBBj7hwM5f1d+
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1044 3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2012 1044 3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe 27 PID 1044 wrote to memory of 2012 1044 3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe 27 PID 1044 wrote to memory of 2012 1044 3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe 27 PID 1044 wrote to memory of 2012 1044 3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe 27 PID 1044 wrote to memory of 2012 1044 3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe"C:\Users\Admin\AppData\Local\Temp\3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exeC:\Users\Admin\AppData\Local\Temp\3793e2d27452cf724ac630bad35561430e9c6c35b16bbb41c973c6d2cbaf24ee.exe2⤵PID:2012
-