Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe
Resource
win10v2004-20221111-en
General
-
Target
492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe
-
Size
1.3MB
-
MD5
353ca39336d2b33d504ba898b73a3c79
-
SHA1
3cde9836a6d324672c68ba8911c9ff7a4510af0a
-
SHA256
492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33
-
SHA512
b38f0517d176715b42cadf3e7bde6ce31f57c334d91b226bdbeb16608ae550b1307b475aa6da414eb71b25ef18e83cac7c4f83d9eed5eb8721dcd37873d3ec9f
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakP:jrKo4ZwCOnYjVmJPac
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4660 set thread context of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 984 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 984 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 984 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 984 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 984 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84 PID 4660 wrote to memory of 984 4660 492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe"C:\Users\Admin\AppData\Local\Temp\492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\492c6697770576d261378bdd6e03430229e9ea54c2ce7e070d653346829aea33.exe
- Suspicious use of SetWindowsHookEx
PID:984
-