Analysis
-
max time kernel
205s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 05:56
Static task
static1
Behavioral task
behavioral1
Sample
0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe
Resource
win10v2004-20221111-en
General
-
Target
0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe
-
Size
1.4MB
-
MD5
3fb67b7acccfd31cb80c93fc12a9638d
-
SHA1
1ea3f906da229ce5d75b9aa45fb5791366f9d56d
-
SHA256
0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529
-
SHA512
0a6da5a73dc0e4ddedce732f432e29b920732da87c34a5b2392584a25ba603d8d4b6d90ca18b5f15fa3acb8e82fced558041ebf7af5dad38176f1e4de2dbbd6f
-
SSDEEP
24576:hrK6dClXmekxlm1dl4r260n4dz0as5jc3AZ1COwiUP/5lq8At:hrBew72604doSw6ewW
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exedescription pid process target process PID 3352 set thread context of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exepid process 4212 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 4212 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 4212 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 4212 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 4212 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exedescription pid process target process PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe PID 3352 wrote to memory of 4212 3352 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe 0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe"C:\Users\Admin\AppData\Local\Temp\0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\0f452d9067442e7db302265fd17ea3d4701fd5fd9470aec44ec0c3d41b4de529.exe
- Suspicious use of SetWindowsHookEx
PID:4212
-