Analysis
-
max time kernel
189s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe
Resource
win10v2004-20221111-en
General
-
Target
d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe
-
Size
1.6MB
-
MD5
0e4b07b0ece75f3e271378ab8c1933ac
-
SHA1
dbe2763744f79ada241de3562f7565ec58f2e75e
-
SHA256
d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08
-
SHA512
d190813507f9e707daa65b9102dd886ed096108a2133c35696539683a00f028d63c6b1cbd0c0ac4891b373118e901a5221588866608e6e85cb908b39547c16ba
-
SSDEEP
24576:oFzJtFQQy+Yxa7kCleJkAKmP/0HWYs4LET3dJ6cTT10njVcyWjE8SDw/8rmxnZCW:EGQy1NvbduWE8S/mxZOebLl
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2732 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 2732 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 2732 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 2732 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 2732 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81 PID 2264 wrote to memory of 2732 2264 d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe"C:\Users\Admin\AppData\Local\Temp\d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe"C:\Users\Admin\AppData\Local\Temp\d920dd8346130d6985d863a31ca848f1d64f852673f6ee0112c8592bf3f21f08.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2732
-