Analysis
-
max time kernel
180s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 01:29
Static task
static1
Behavioral task
behavioral1
Sample
e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe
-
Size
100KB
-
MD5
4e374428a7656c5148175db5069fb40b
-
SHA1
a5e903e0159181b9b8c30958fecabad4d20bb71d
-
SHA256
e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e
-
SHA512
6866f3d528ff503e31e28792630f776c3f090c195116697452a3b16cc04b9d0c55f6eb5ecb1960756d6783cef0c91439b0a29a4d7b117436746244fe775df45e
-
SSDEEP
1536:ODJDuiYusKVk9z7nXQrjFGYjjOK+LdIgsw:GhYusUk5bArXOp6w
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3324 set thread context of 3392 3324 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3392 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 3392 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3392 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 3392 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3324 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3324 wrote to memory of 3392 3324 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 81 PID 3324 wrote to memory of 3392 3324 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 81 PID 3324 wrote to memory of 3392 3324 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 81 PID 3324 wrote to memory of 3392 3324 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 81 PID 3324 wrote to memory of 3392 3324 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 81 PID 3324 wrote to memory of 3392 3324 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 81 PID 3392 wrote to memory of 4512 3392 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 82 PID 3392 wrote to memory of 4512 3392 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 82 PID 3392 wrote to memory of 4512 3392 e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe"C:\Users\Admin\AppData\Local\Temp\e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe"C:\Users\Admin\AppData\Local\Temp\e28f7f059b1b5710f95266e8c1c9fc730fb92ac984feed1ac3489b1a0cc4931e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4512
-
-