Analysis
-
max time kernel
152s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:14
Static task
static1
Behavioral task
behavioral1
Sample
e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe
Resource
win10v2004-20221111-en
General
-
Target
e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe
-
Size
1.3MB
-
MD5
fdb2513d0634531e18c3953f981dba1b
-
SHA1
d87e55529791807ab16726f05ad743893fc7e8b1
-
SHA256
e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357
-
SHA512
85402b17ab1e76fddd2555d5e1d591b76fa21a5800a942fdec64ce86b3b13921c0bbea0d23448eb1b82844bea61973154d59fe0f2bc4e686f26e7634b8974f02
-
SSDEEP
24576:rrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak0:rrKo4ZwCOnYjVmJPaj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exedescription pid process target process PID 3968 set thread context of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exepid process 3620 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe 3620 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe 3620 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe 3620 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe 3620 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exedescription pid process target process PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe PID 3968 wrote to memory of 3620 3968 e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe"C:\Users\Admin\AppData\Local\Temp\e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\e1e25d4b29d38bd6943786bda16c19deadba0a8d9a0ed1800b9234ec10c98357.exe
- Suspicious use of SetWindowsHookEx
PID:3620