Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:31
Static task
static1
Behavioral task
behavioral1
Sample
7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe
Resource
win10v2004-20221111-en
General
-
Target
7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe
-
Size
1.1MB
-
MD5
cce803f0ad0789ec356b239beca906ac
-
SHA1
84d39e11b41a537eaed514ccce44eac13e4e550b
-
SHA256
7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1
-
SHA512
6102b70b9372b9417b3923c6c95ba9346922cb5a4dcefb4c0f81c22ca375e8b0ea7483fab88722111f91bfe6a15fff2c5f4da71aaa17c1b05fe33ae490c71334
-
SSDEEP
24576:iio2C4Tz86EE1by3swR9HrwNmojHuD/bsytUltKo+5+VYrle5se:k4TzJJm9R9kFTSbNtkwo+5Vrle5r
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exedescription pid process target process PID 4224 set thread context of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exepid process 4752 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 4752 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 4752 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 4752 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 4752 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exedescription pid process target process PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe PID 4224 wrote to memory of 4752 4224 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe 7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe"C:\Users\Admin\AppData\Local\Temp\7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\7c404360a39dd40565cc57160ee4cc76780aedc8914bc0e53573ad88d955dfc1.exe
- Suspicious use of SetWindowsHookEx
PID:4752