Analysis
-
max time kernel
61s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 19:01
Static task
static1
Behavioral task
behavioral1
Sample
a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe
Resource
win10v2004-20220901-en
General
-
Target
a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe
-
Size
1.3MB
-
MD5
e4dc33a92ea4b648cccfc4b1e09de044
-
SHA1
6d9048b48eb8f95efcf59591de31bcca6bf873d4
-
SHA256
a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634
-
SHA512
92b18f15dd5f9dc62de705411b9496e34001cc8fad60f4543e817e324012eda656a41f8eb778341874a9d571dcbeb304f01b83a520189b4744bbee878563a5eb
-
SSDEEP
24576:KXO93poEu4pCkao1bNQfSyNGXTYGwwKCWiBe+I351KDsTXY8vZ6QeP:KMZoANNbyNGjW8u5MsTXY8vfi
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1612 set thread context of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1984 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 1984 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 1984 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 1984 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 1984 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82 PID 1612 wrote to memory of 1984 1612 a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe"C:\Users\Admin\AppData\Local\Temp\a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\a804ccd2bca1953a57b9f000ad957144ec5258d97316bea8724c1b9c15f4a634.exe
- Suspicious use of SetWindowsHookEx
PID:1984
-