Analysis
-
max time kernel
117s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe
Resource
win10v2004-20220812-en
General
-
Target
71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe
-
Size
1.3MB
-
MD5
da50dec654c4796ed5ac946d28f88355
-
SHA1
8cb4b192b9a7b502706272608a5ae5c0a92fca9b
-
SHA256
71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba
-
SHA512
0b7182924418db7db5ed436f6db4a97158ee4b24e2500fcd1aee8ac9035e7d38d5505ed36cb74bd3b9ce3b2a3c31840878a5eaa17ecf53f833cdeeb46a37c367
-
SSDEEP
24576:TGjJZtAXaMb5YpCCNAfGU64giomYhXlZwVBhVS+JbIHICWKotTn+Qg:TGNZpbmfLRgioDXz+BhA3SvVnTg
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5004 set thread context of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4464 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 4464 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 4464 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 4464 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 4464 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80 PID 5004 wrote to memory of 4464 5004 71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe"C:\Users\Admin\AppData\Local\Temp\71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\71ac5f7e3417828e61b5e2ded2e6c9d13c452372fe2be12fb5e02a2e123becba.exe
- Suspicious use of SetWindowsHookEx
PID:4464
-