Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 15:00
Static task
static1
Behavioral task
behavioral1
Sample
f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe
Resource
win10v2004-20220812-en
General
-
Target
f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe
-
Size
47KB
-
MD5
04591bec5844d1dc3192207ae9bf6e68
-
SHA1
03e906029dcb222cb5449852a2286b850b14536f
-
SHA256
f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676
-
SHA512
cfa69a34757c716c2288f31bf555787a71fa637548c274da31a5e8d4ea4bb675105b00e286f31390a441ca001a213d21220f3ab747810d106479463071de1a94
-
SSDEEP
768:BmStqnmTwP2N1aEqdR26fkjV62GcN6bvfjxI1kIo6YCXeM9K9tJju2NsdLTy:B7Cm8P2NedR26fkR62GcSzCo6YCiZukD
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1768 set thread context of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 1332 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 1332 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27 PID 1768 wrote to memory of 1332 1768 f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe"C:\Users\Admin\AppData\Local\Temp\f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\f815943a58d9b7c70ad1428e8cb0fb30ea4811591b199546671551840f1c0676.exea|2⤵
- Suspicious use of SetWindowsHookEx
PID:1332
-