Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 05:44
Static task
static1
Behavioral task
behavioral1
Sample
1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe
Resource
win10v2004-20221111-en
General
-
Target
1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe
-
Size
1.4MB
-
MD5
4bba53061e578abed751c446d5da34a3
-
SHA1
77eceb40278f3e299146314be892b0672fe5b32f
-
SHA256
1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b
-
SHA512
8e48bd2ef148a9c9b74b3b5bb01a6972b9dec8238eb7a9dffeba0c803096f169283c47eb95be5762158a876f3266de5b66550506ed5a16b473babb6e0df96e23
-
SSDEEP
24576:hrK6dClXmekxlm1dl4r260n4dz0as5jc3AZ1COwiUP/5lq8Ax:hrBew72604doSw6ew6
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exedescription pid process target process PID 4812 set thread context of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exepid process 2180 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 2180 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 2180 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 2180 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 2180 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exedescription pid process target process PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe PID 4812 wrote to memory of 2180 4812 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe 1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe"C:\Users\Admin\AppData\Local\Temp\1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\1db3c89e6d7da2679f8b1b00caa0c38852752f3e5ec2c185a59f85f9c7b57d5b.exe
- Suspicious use of SetWindowsHookEx
PID:2180
-