Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:05
Static task
static1
Behavioral task
behavioral1
Sample
05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe
Resource
win10v2004-20221111-en
General
-
Target
05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe
-
Size
1.4MB
-
MD5
5b09dcf14bd691ecff3fd8b993af112d
-
SHA1
66ec02aff5b8f89bebc6caff75f1834203f6adc4
-
SHA256
05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2
-
SHA512
f9e553b48b012c1afcbfc13c2b9b55d4688c1c494a9f122e9146c01d5f85d5af42b33558ada59341223756e6fb4bbd8a5331568b0f80326980a6070c1abfe433
-
SSDEEP
24576:1KWQBT4nVU85afaniK/792DxAA4PNn0DLg78E2y2R3rh+Zx1kyFh:1NQJJ2B2WZd0DUGf3d+ZLkyn
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exedescription pid process target process PID 4680 set thread context of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exepid process 1264 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 1264 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 1264 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 1264 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 1264 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exedescription pid process target process PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe PID 4680 wrote to memory of 1264 4680 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe 05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe"C:\Users\Admin\AppData\Local\Temp\05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\05efbdb6d8b4e5604a04ffaaf753a6192b806d86e1ef507c8c351c15257984d2.exe
- Suspicious use of SetWindowsHookEx
PID:1264