Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 16:55
Static task
static1
Behavioral task
behavioral1
Sample
0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe
Resource
win10v2004-20220812-en
General
-
Target
0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe
-
Size
1.3MB
-
MD5
b26b10f0c3c77650a55005ff8c358011
-
SHA1
162f4f9b5eb6f5e760b5369d759994051dd3280d
-
SHA256
0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85
-
SHA512
f99478da8026b9497e74f81234ded5bfed3ba5769f059b209b6ea766be53e6c4f7ba091fbe4b9dc0ac45fa0a6b58aceaec5e43ecec68f0691b44c753bf31e764
-
SSDEEP
24576:brKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak5:brKo4ZwCOnYjVmJPa+
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3648 set thread context of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4248 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 4248 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 4248 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 4248 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 4248 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79 PID 3648 wrote to memory of 4248 3648 0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe"C:\Users\Admin\AppData\Local\Temp\0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\0c29a7877403874d39a08de1ae844a8145517c067951556e88deb20a83442c85.exe
- Suspicious use of SetWindowsHookEx
PID:4248
-