Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:17
Static task
static1
Behavioral task
behavioral1
Sample
df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe
Resource
win10v2004-20220901-en
General
-
Target
df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe
-
Size
1.3MB
-
MD5
50558279809db38abb70da29066c6814
-
SHA1
ce164063d117858d5c250d6d5b9bbe0c33788c9b
-
SHA256
df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844
-
SHA512
fad18075e3ca30cc40826d08964e6dba5b3abb1e8f591835c629894864f8e91fc07fda87089a05795372d7a198abc6b67a570edd4f1ee66bbb66cdc7b7ddc324
-
SSDEEP
24576:DrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak6:DrKo4ZwCOnYjVmJPad
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exedescription pid process target process PID 3360 set thread context of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exepid process 2556 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe 2556 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe 2556 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe 2556 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe 2556 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exedescription pid process target process PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe PID 3360 wrote to memory of 2556 3360 df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe"C:\Users\Admin\AppData\Local\Temp\df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\df89f0010b2d5c2bab3912af92fb20c2ff925d56e97ae76a6739c794eed1a844.exe
- Suspicious use of SetWindowsHookEx
PID:2556