Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe
Resource
win10v2004-20221111-en
General
-
Target
f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe
-
Size
1.3MB
-
MD5
e403d2ccc17a92493d53c77e206fea12
-
SHA1
8f829bfcb5124228e87c4267a860e8a83264eb16
-
SHA256
f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301
-
SHA512
a448e5cd6b1cc197405c43e725e44c3fc676ae5a24fb72c86b8cf1abcaa02aed09f824830290c643134814cb2ef3f09bdea97bba4a35475955a89f59eabdbb11
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakj:jrKo4ZwCOnYjVmJPaM
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2520 set thread context of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4900 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 4900 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 4900 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 4900 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 4900 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82 PID 2520 wrote to memory of 4900 2520 f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe"C:\Users\Admin\AppData\Local\Temp\f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\f0a00eb2a8cb4cc886b9181f39c8c7b80ef869da95b65c81345ec557e07b8301.exe
- Suspicious use of SetWindowsHookEx
PID:4900
-