Analysis
-
max time kernel
163s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe
Resource
win10v2004-20221111-en
General
-
Target
005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe
-
Size
1.0MB
-
MD5
6aab6508a1bf695e87e907b87e7d74de
-
SHA1
53deca40a1c40e6f12f166590bbbf9a669be4b9e
-
SHA256
005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f
-
SHA512
755c61cad8ef876a6310bdda80cd3e78f5b0fc560dafa70c11991b2bf08c0d19844fd332fc90e5b04a11b05f89d994f140aa3e7cf97bce06b3776c8d57021fb0
-
SSDEEP
24576:oJ0FPl0XoDnqgEdhlaCT3xXGHRXjEuuMjM4jm6dVriAUli8WXHXlpg:oWFPaXGalaCTt8XjwoGji8T
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1792 set thread context of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4844 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 4844 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 4844 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 4844 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 4844 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82 PID 1792 wrote to memory of 4844 1792 005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe"C:\Users\Admin\AppData\Local\Temp\005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\005b5cb4a1f23d75e78d7f99c63bed6b4ece3bc416bc05cb288a9667b114359f.exe
- Suspicious use of SetWindowsHookEx
PID:4844
-