Analysis
-
max time kernel
202s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe
Resource
win10v2004-20221111-en
General
-
Target
8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe
-
Size
1.3MB
-
MD5
537f8a355d30db71f17f4ad4991c9093
-
SHA1
90559137b41ee76689f8b90f456f73c138367bd1
-
SHA256
8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a
-
SHA512
ce867c3fe086870b4f190542df2fd7ac32c9488e7c4a3555c6bdac0cce2215c4ff0f02366eb99b6f98bdeffe7574002998084584385ee901c7c280e545dace79
-
SSDEEP
24576:DXO93poEu4pCkao1bNQfSyNGXTYGwwKCWiBe+I351KDsTXY8vZ6QeQ:DMZoANNbyNGjW8u5MsTXY8vfJ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3496 set thread context of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4684 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 4684 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 4684 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 4684 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 4684 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83 PID 3496 wrote to memory of 4684 3496 8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe"C:\Users\Admin\AppData\Local\Temp\8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\8a62ee37e128520e2f44b417219e90d73bf8acaab109c0395cd07e740eb9f16a.exe
- Suspicious use of SetWindowsHookEx
PID:4684
-