Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe
Resource
win10v2004-20220812-en
General
-
Target
c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe
-
Size
224KB
-
MD5
0ab864447ba9a51cc753dbf12cb101ad
-
SHA1
b844e18dbf65b169e607496fbb902083950d877c
-
SHA256
c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c
-
SHA512
01441e645fddfc5a03d0946aa5eb7da55d48b2c2e661d4f6cd44b2618ebd1ccbfcb48ce73d4099b1cd5bf5bb8b9cd0e3ee476a1916d345f22d6acc40e766a9dd
-
SSDEEP
3072:YTX8pHwGj3+o5Axtpp823VoJjUX9wOErlNM9x6LWf+J0qqJ9TDMW:YTXeIxvp8RS9wOEMxXf+29Tj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1424 set thread context of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26 PID 1424 wrote to memory of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26 PID 1424 wrote to memory of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26 PID 1424 wrote to memory of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26 PID 1424 wrote to memory of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26 PID 1424 wrote to memory of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26 PID 1424 wrote to memory of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26 PID 1424 wrote to memory of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26 PID 1424 wrote to memory of 1852 1424 c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe"C:\Users\Admin\AppData\Local\Temp\c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe"C:\Users\Admin\AppData\Local\Temp\c6748af869f81a466c7fcc8816bc1783cc5c65a78ddec8d33f7f184ec761ee7c.exe"2⤵PID:1852
-