Analysis
-
max time kernel
187s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe
Resource
win10v2004-20220812-en
General
-
Target
9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe
-
Size
4.3MB
-
MD5
0fc02100ae3fbfd6085f11ec535570a3
-
SHA1
8b784881985c13073ba808b6f7135f7788da1153
-
SHA256
9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d
-
SHA512
5e8969d0665fd82977726e9db87f9bcde218bc8f26067e2344776449b52984a092684f115a17518f367973a8433958c31fe34c692a9853deb287c7acb70f27c5
-
SSDEEP
98304:GeQyQr2uC4xOrw3AjrOdV+fF7sETIO0uE796qPpnnzimdhqnWtRJEedecJQ:L/rQSOed7JT/0uu96wNzimdhqnWBq
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 844 set thread context of 852 844 9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe 28 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 844 wrote to memory of 852 844 9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe 28 PID 844 wrote to memory of 852 844 9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe 28 PID 844 wrote to memory of 852 844 9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe 28 PID 844 wrote to memory of 852 844 9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe 28 PID 844 wrote to memory of 852 844 9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe 28 PID 844 wrote to memory of 852 844 9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe"C:\Users\Admin\AppData\Local\Temp\9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe"C:\Users\Admin\AppData\Local\Temp\9225773b22ce9c62666e45181ccb7527d997d9368d94450ef8cd4ebccc14fc0d.exe"2⤵PID:852
-