Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe
Resource
win10v2004-20220812-en
General
-
Target
87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe
-
Size
1.2MB
-
MD5
ff3f7d3ac8ceebac3f564dd1654a9d8a
-
SHA1
4fd61dfb6f43d237898ab008bd700ebdda5d91f5
-
SHA256
87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b
-
SHA512
8a0e66cd52207c30058f1b53367c874bcb9695f552f341e7eff643c9de2478ab0bdc6760b1bc6b9bb470a115df712d5db3c6b830d16b6f76f1d75a4cbb7fe8db
-
SSDEEP
24576:cCe9Oe9v9mKihqDftePGtlD75o1sfsNP0G3jXpaIpF:cHO2v9mKihE6QDdMkOFaQF
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1912 set thread context of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1820 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 1820 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 1820 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 1820 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 1820 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80 PID 1912 wrote to memory of 1820 1912 87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe"C:\Users\Admin\AppData\Local\Temp\87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\87ccceebb90d718058b9da97dcea4f532f2d23621976b28f7a781cc905c7b78b.exe
- Suspicious use of SetWindowsHookEx
PID:1820
-