Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 13:58
Static task
static1
Behavioral task
behavioral1
Sample
3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe
Resource
win10v2004-20221111-en
General
-
Target
3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe
-
Size
1.3MB
-
MD5
1e047658e780ecb175575f33b85ccce4
-
SHA1
d85d59ca9d010437dbae84863e9fc65008e38feb
-
SHA256
3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337
-
SHA512
2d7a1ed7005b4f0488f3e034e40d43d6b7744a5fa43a84eef21e01d0059fa43e65ad21eff1064cff3287036a46de6cdba8288ecbacea943fa6c1771d1df34bbd
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaky:7rKo4ZwCOnYjVmJPal
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1096 set thread context of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4244 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 4244 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 4244 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 4244 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 4244 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84 PID 1096 wrote to memory of 4244 1096 3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe"C:\Users\Admin\AppData\Local\Temp\3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\3eb3895bb7032a859c24e9b1251e4da84bd5afa994354bcd6c0026eb8987f337.exe
- Suspicious use of SetWindowsHookEx
PID:4244
-