Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe
Resource
win10v2004-20220812-en
General
-
Target
ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe
-
Size
138KB
-
MD5
936f1fbbce687b73cae25a4ae3e51b10
-
SHA1
6f274edeb9916a8a6a63c8e07ad82c7186f02e9f
-
SHA256
ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46
-
SHA512
2b4090d338b94b477cbc23a0eca9d87d4bf6c854c3e4f3af254d0ffffa4ed7fd087f3272be207ae83f479acad3652f6c702139c51aabbd1460cadca4673448bd
-
SSDEEP
3072:uLjRomxVKIrfewze5Cq1EwRCpc+uT42USZVhjC2JpTRZDFlOSP:uHFKIrfewzewq1FCpWTfUSZVNC2Jp1Zz
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1480 set thread context of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27 PID 1480 wrote to memory of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27 PID 1480 wrote to memory of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27 PID 1480 wrote to memory of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27 PID 1480 wrote to memory of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27 PID 1480 wrote to memory of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27 PID 1480 wrote to memory of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27 PID 1480 wrote to memory of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27 PID 1480 wrote to memory of 1628 1480 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe"C:\Users\Admin\AppData\Local\Temp\ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exeC:\Users\Admin\AppData\Local\Temp\ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe2⤵PID:1628
-