Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe
Resource
win10v2004-20221111-en
General
-
Target
eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe
-
Size
1.0MB
-
MD5
c64234cbb798abdb10387d760b04e9f0
-
SHA1
5862bec0d7c7cd837c234ffe1b6f5aedb0bf9808
-
SHA256
eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3
-
SHA512
02460637aa12a5a42fae708d84a76fc2dfc792ad43a99f1e3a2b64e262ded3568a741b717c45c4415775881501f846753f646dba3d13abf7773c53749e2b4a45
-
SSDEEP
24576:fJ0FPl0XoDnqgEdhlaCT3xXGHRXjEuuMjM4jm6dVriAUli8WXHXlpf:fWFPaXGalaCTt8XjwoGji8c
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1420 set thread context of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3736 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 3736 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 3736 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 3736 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 3736 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84 PID 1420 wrote to memory of 3736 1420 eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe"C:\Users\Admin\AppData\Local\Temp\eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\eb260e479417329ada75f6bc1722c71f8a209e36c3a753f4f2c20c883293c6a3.exe
- Suspicious use of SetWindowsHookEx
PID:3736
-