Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe
Resource
win10v2004-20221111-en
General
-
Target
6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe
-
Size
1.3MB
-
MD5
2331fa9c1cb16542ed58db6248bd35e7
-
SHA1
f98d944eae432814317d926bd61a8148c75b1991
-
SHA256
6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd
-
SHA512
caa045bf8e685ec08c78698ffc9053623b0adc4bd8b448e38055d5bcde42a59951c1ff79ecc83ed70fb7d204b7e00bf3e3244f226374b6c2c3faf4977e76ab3e
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:TrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4132 set thread context of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1212 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 1212 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 1212 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 1212 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 1212 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82 PID 4132 wrote to memory of 1212 4132 6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe"C:\Users\Admin\AppData\Local\Temp\6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\6ae7adda853104232f07d07b5b30425c8da1bd7cc42c85863a5b4d1da4ebdddd.exe
- Suspicious use of SetWindowsHookEx
PID:1212
-