Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:42
Static task
static1
Behavioral task
behavioral1
Sample
3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe
Resource
win10v2004-20220812-en
General
-
Target
3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe
-
Size
1.1MB
-
MD5
1218ebb2a3057b03a39a24fa7f31fafa
-
SHA1
d66e2e2f799130c1c3700274dd2012ebbfb1b528
-
SHA256
3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300
-
SHA512
7d3fbc09b2e1f59a7222b700e828c1d9d5a00a751adba01e5246efe35a8bfcb40d979bc9457ecc86f3c1f5d49fa8cf2ad0cdc39c098ce51502c0d2e2d59c8386
-
SSDEEP
24576:yio2C4Tz86EE1by3swR9HrwNmojHuD/bsytUltKo+5+VYrle5sN:U4TzJJm9R9kFTSbNtkwo+5Vrle5Y
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exedescription pid process target process PID 5092 set thread context of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exepid process 3028 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3028 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3028 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3028 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3028 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exedescription pid process target process PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe PID 5092 wrote to memory of 3028 5092 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe 3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe"C:\Users\Admin\AppData\Local\Temp\3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\3e13eb539348291d7f93fce08ae0f1ab7e8b56e1cca5287565f85bd69e33a300.exe
- Suspicious use of SetWindowsHookEx
PID:3028