Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:12
Static task
static1
Behavioral task
behavioral1
Sample
e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe
Resource
win10v2004-20220812-en
General
-
Target
e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe
-
Size
1.3MB
-
MD5
d016896b5dcc4700c9a5fa45f4408652
-
SHA1
fa3774a85892f15ee7bfe847fc16d238eb479577
-
SHA256
e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841
-
SHA512
46f1e0b9bef6184786b37b215a44cb469ba6d68a89b02e50a4460599ca9f32992fe1198e34241e65380fc215968b5d5c697faf2095e8202036ed29afe220b3df
-
SSDEEP
24576:rrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:rrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exedescription pid process target process PID 4660 set thread context of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exepid process 3044 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe 3044 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe 3044 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe 3044 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe 3044 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exedescription pid process target process PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe PID 4660 wrote to memory of 3044 4660 e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe"C:\Users\Admin\AppData\Local\Temp\e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\e2d4d425757bba6507e426f8128aa26f8bd99abf6f2e85613a772b62ddb7f841.exe
- Suspicious use of SetWindowsHookEx
PID:3044