Analysis
-
max time kernel
173s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe
Resource
win10v2004-20221111-en
General
-
Target
53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe
-
Size
1.4MB
-
MD5
723d4e729b22ff24512026de884f624f
-
SHA1
e9530e7869badf77e13a032bdcb41e71db33f071
-
SHA256
53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc
-
SHA512
9239b4e5b94fcd40d220b4127dd88ad3af1934a7b622f56362de0f6c3a08c5fa59eb74aff6aed3629eeb144e099e14103244e644b0d417f8af2010b9f5b3fefc
-
SSDEEP
24576:hrK6dClXmekxlm1dl4r260n4dz0as5jc3AZ1COwiUP/5lq8AH:hrBew72604doSw6ewc
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2544 set thread context of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4824 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 4824 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 4824 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 4824 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 4824 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83 PID 2544 wrote to memory of 4824 2544 53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe"C:\Users\Admin\AppData\Local\Temp\53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\53988a260c68f5d8c56e8982de177cd514cf206f8fbb48c22d5cf79a373da8cc.exe
- Suspicious use of SetWindowsHookEx
PID:4824
-