Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:19
Static task
static1
Behavioral task
behavioral1
Sample
cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe
Resource
win10v2004-20220812-en
General
-
Target
cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe
-
Size
1.1MB
-
MD5
a7f13c2dd05ae6bea26ad78b31bf61b0
-
SHA1
778074afc737e343e446e64ce005efa026e9f6ec
-
SHA256
cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1
-
SHA512
ab98d6770d018c3f44b02de6c1cdc90e191121c50467ce349c4bc419b376b5fb86710664d3dfc877ec8d478ad19e1ce8a4b0f6f280252d107fbea0e5cf389174
-
SSDEEP
24576:iio2C4Tz86EE1by3swR9HrwNmojHuD/bsytUltKo+5+VYrle5s9:k4TzJJm9R9kFTSbNtkwo+5Vrle54
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exedescription pid process target process PID 4056 set thread context of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exepid process 2084 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe 2084 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe 2084 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe 2084 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe 2084 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exedescription pid process target process PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe PID 4056 wrote to memory of 2084 4056 cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe"C:\Users\Admin\AppData\Local\Temp\cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\cd3a5d5e2ca552459304309eb8f1db62834fb14e76a22f5bfb8963316c3e5fb1.exe
- Suspicious use of SetWindowsHookEx
PID:2084
-