Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 11:45
Static task
static1
Behavioral task
behavioral1
Sample
ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe
Resource
win10v2004-20220812-en
General
-
Target
ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe
-
Size
138KB
-
MD5
936f1fbbce687b73cae25a4ae3e51b10
-
SHA1
6f274edeb9916a8a6a63c8e07ad82c7186f02e9f
-
SHA256
ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46
-
SHA512
2b4090d338b94b477cbc23a0eca9d87d4bf6c854c3e4f3af254d0ffffa4ed7fd087f3272be207ae83f479acad3652f6c702139c51aabbd1460cadca4673448bd
-
SSDEEP
3072:uLjRomxVKIrfewze5Cq1EwRCpc+uT42USZVhjC2JpTRZDFlOSP:uHFKIrfewzewq1FCpWTfUSZVNC2Jp1Zz
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5004 set thread context of 4920 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 80 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4920 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 80 PID 5004 wrote to memory of 4920 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 80 PID 5004 wrote to memory of 4920 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 80 PID 5004 wrote to memory of 4920 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 80 PID 5004 wrote to memory of 4920 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 80 PID 5004 wrote to memory of 4920 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 80 PID 5004 wrote to memory of 4920 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 80 PID 5004 wrote to memory of 4920 5004 ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe"C:\Users\Admin\AppData\Local\Temp\ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exeC:\Users\Admin\AppData\Local\Temp\ede424ebbeb0284732e404fda4499dc49c548ccd98211dec80dd8045d6be3e46.exe2⤵PID:4920
-