Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:36
Static task
static1
Behavioral task
behavioral1
Sample
609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe
Resource
win10v2004-20220812-en
General
-
Target
609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe
-
Size
1.1MB
-
MD5
a89e687fdc7f9f0dab2671a82ca7b131
-
SHA1
fe2af3d65c7ba1fdaad7ea797a39dcc857e9e35a
-
SHA256
609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b
-
SHA512
d12e5a476555e789639fb88c359395d4fa8544941ef515c25d0ef393e162eb778710feb72767074388cc23ac88e84b6f0d860fa5b4b152a90ee99ac40e62194c
-
SSDEEP
24576:yio2C4Tz86EE1by3swR9HrwNmojHuD/bsytUltKo+5+VYrle5sN:U4TzJJm9R9kFTSbNtkwo+5Vrle50
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exedescription pid process target process PID 1644 set thread context of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exepid process 3676 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 3676 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 3676 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 3676 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 3676 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exedescription pid process target process PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe PID 1644 wrote to memory of 3676 1644 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe 609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe"C:\Users\Admin\AppData\Local\Temp\609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\609bb823ab4bdf2f21202b4f58f29de2b84cfa53eda7423f4ea77f09ede2276b.exe
- Suspicious use of SetWindowsHookEx
PID:3676