Analysis
-
max time kernel
159s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 04:16
Static task
static1
Behavioral task
behavioral1
Sample
e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe
Resource
win10v2004-20221111-en
General
-
Target
e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe
-
Size
1.3MB
-
MD5
9849d23b1a492a7568959e6caf945a74
-
SHA1
dc4f19e5a95b2fd894e5ae94eca73672a1d32f5e
-
SHA256
e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614
-
SHA512
abbfd61ca7a6be07186a7e5a8a10f526ec2d9bfcce32bc89872ab0165da5d49b35ee803cc78124fef4b074045e8f3c3e42707f9388c878b521110b23f52bdc00
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:zrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1204 set thread context of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3184 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 3184 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 3184 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 3184 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 3184 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85 PID 1204 wrote to memory of 3184 1204 e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe"C:\Users\Admin\AppData\Local\Temp\e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\e4152cf3fc1cff0471fbdbbc9ec42a0def6415fecbebf9a6c7db4d3c24954614.exe
- Suspicious use of SetWindowsHookEx
PID:3184
-