Analysis
-
max time kernel
91s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe
Resource
win10v2004-20220901-en
General
-
Target
863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe
-
Size
1.3MB
-
MD5
e5908381c6cb80f35cf988175bdf020a
-
SHA1
7754cc1a0abeb6dc3a434a8d5b24bd222f078806
-
SHA256
863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304
-
SHA512
808bb034e3e74617ee385c1f18235970b0e5a0530fdd1c0097540c19de53107d39c7e89855ead48585ec2853222a5938729a0b9a901c1b00e9da03be4525e2a3
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakF:jrKo4ZwCOnYjVmJPae
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3488 set thread context of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2432 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 2432 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 2432 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 2432 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 2432 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81 PID 3488 wrote to memory of 2432 3488 863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe"C:\Users\Admin\AppData\Local\Temp\863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\863dcad47ae3349808319c88db8181f15a18e1c0621f548a5e1405ef4831c304.exe
- Suspicious use of SetWindowsHookEx
PID:2432
-