Analysis
-
max time kernel
159s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe
Resource
win10v2004-20221111-en
General
-
Target
8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe
-
Size
1.3MB
-
MD5
9f18c1eb19a46dfa12dd70fa47c20b86
-
SHA1
a138f989c5f026a1d84e7cf4317743ea841f56eb
-
SHA256
8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d
-
SHA512
7a6476036bfacf19c77c3a67443f0c310bab152cea13a770fef0879dd61c64e9bafe9580bc50b8de934df202b0fc12d9f3c1da0f19cff1cbd0eb6815d3367f22
-
SSDEEP
24576:brKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaku:brKo4ZwCOnYjVmJPad
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2572 set thread context of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3348 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 3348 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 3348 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 3348 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 3348 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82 PID 2572 wrote to memory of 3348 2572 8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe"C:\Users\Admin\AppData\Local\Temp\8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\8734028ed6bc071b10cb960ae73c770744e37ba239336dd8bbb3851762ffb97d.exe
- Suspicious use of SetWindowsHookEx
PID:3348
-