Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe
Resource
win10v2004-20221111-en
General
-
Target
9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe
-
Size
1.3MB
-
MD5
bf71899f22440258973b84f8c3be40a2
-
SHA1
d3bc7332d158fa974a405ba8ec1971eacbbb1608
-
SHA256
9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41
-
SHA512
f8824ec9656a76bfd9e7b3981b97802cb691757de5cf49907d16dddd2c7ab86850dcf12d511e4ad94a906bcc5a75d79f2dfd6f8ad3081bdecdc5ab8db6f8b6fe
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakP:TrKo4ZwCOnYjVmJPa4
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4988 set thread context of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 864 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 864 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 864 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 864 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 864 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85 PID 4988 wrote to memory of 864 4988 9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe"C:\Users\Admin\AppData\Local\Temp\9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\9cd3d9d7c98fc62f2a542147eb3395c7b6262f51daf1929da31d464c00edbf41.exe
- Suspicious use of SetWindowsHookEx
PID:864
-