Analysis
-
max time kernel
163s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe
Resource
win10v2004-20221111-en
General
-
Target
4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe
-
Size
1.3MB
-
MD5
77b680bcfc8b0d7d44e7d565f2874d86
-
SHA1
c73dfc38f750529fa97570fecb47833e901f2ac9
-
SHA256
4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7
-
SHA512
b3e35d380050af0e43f616dc6f109857dfe0cb6c69308dfeb7b1af3cd69b46adb56af5b8ff7552df86228160ec6985eed7e07380f4bdef5b31272e8498de31ba
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakJ:TrKo4ZwCOnYjVmJPa6
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3472 set thread context of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 480 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 480 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 480 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 480 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 480 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83 PID 3472 wrote to memory of 480 3472 4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe"C:\Users\Admin\AppData\Local\Temp\4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\4ca131170faa51b75da26975dd5e0edfa08975933972fefb3f80b34f9fd350a7.exe
- Suspicious use of SetWindowsHookEx
PID:480
-