Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe
Resource
win10v2004-20220812-en
General
-
Target
a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe
-
Size
1.3MB
-
MD5
62668cc7a7c5aac35dd2335505527384
-
SHA1
825c1e8c7ec5fffb89307eb7807c5b74d3ac8708
-
SHA256
a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca
-
SHA512
242692dd1fd88a7419df6d45c3d4ca80d59ef962a6f92107c20807b1416d63ada82344484bf88a48dc55b02a05ee19283af3cc5b7d81686e9bf26c0bc698be71
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak8:TrKo4ZwCOnYjVmJPaL
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3172 set thread context of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3796 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 3796 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 3796 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 3796 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 3796 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79 PID 3172 wrote to memory of 3796 3172 a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe"C:\Users\Admin\AppData\Local\Temp\a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\a9646e4957d48f9139cc808d56304aac98c53fa935b2a763b8a3538485de2bca.exe
- Suspicious use of SetWindowsHookEx
PID:3796
-