Analysis
-
max time kernel
166s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 18:49
Static task
static1
Behavioral task
behavioral1
Sample
5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe
Resource
win10v2004-20221111-en
General
-
Target
5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe
-
Size
1.3MB
-
MD5
d345f48be0fbccfcc4464ce2796f0b05
-
SHA1
9667f71eb991769971d12f8147d77545b4aa1079
-
SHA256
5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd
-
SHA512
417c98cc7a969340ffa4477702bf6bdda783b8e9c102bde16ff61505e05b7f03fb91fafe536ea0668791af5b683024efb08aeda6cef0118f54794129108d8719
-
SSDEEP
24576:wprt9au8OGecdnpCmHPaKkdxyHPHVs/twDy0YxbHcvvO48/:wwdnBTkdx6HVs/+8xeQ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4500 set thread context of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4532 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 4532 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 4532 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 4532 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 4532 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83 PID 4500 wrote to memory of 4532 4500 5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe"C:\Users\Admin\AppData\Local\Temp\5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\5ec01095b44081a072e0d70d2922283f178e58638af6fee1003c2a00645e0efd.exe
- Suspicious use of SetWindowsHookEx
PID:4532
-