Analysis
-
max time kernel
123s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 20:22
Static task
static1
Behavioral task
behavioral1
Sample
41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe
Resource
win10v2004-20220812-en
General
-
Target
41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe
-
Size
612KB
-
MD5
831070e383ccde5012f9e5ca8863d7ba
-
SHA1
1a60eb040c9666c790f2521fb426fe6fc6d12c05
-
SHA256
41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8
-
SHA512
32060ebc855833c48cd8459320e9ee85c2d385283e286cac3d27c4bfb52dcfeaf7c2de26b5f7e78f1e595b2876f7cfcf67a7591af276893ad0d41fbcfbcc5e9b
-
SSDEEP
1536:LcjcRsorTPuzg2/lwLp5iiVdygQcjcRsorTPuzg2/lwLe8ZOw5w:golCzg2/lwPSgPolCzg2/lwCV2w
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1096 set thread context of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84 PID 1096 wrote to memory of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84 PID 1096 wrote to memory of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84 PID 1096 wrote to memory of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84 PID 1096 wrote to memory of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84 PID 1096 wrote to memory of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84 PID 1096 wrote to memory of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84 PID 1096 wrote to memory of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84 PID 1096 wrote to memory of 2224 1096 41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe"C:\Users\Admin\AppData\Local\Temp\41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exeC:\Users\Admin\AppData\Local\Temp\41636decdb7da790fe501eefc2a2af2909c1023ce841ce1bcc40c0863ee431b8.exe2⤵PID:2224
-