Analysis
-
max time kernel
184s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:26
Static task
static1
Behavioral task
behavioral1
Sample
da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe
Resource
win10v2004-20221111-en
General
-
Target
da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe
-
Size
1.3MB
-
MD5
33a6c848899532e94610b123ff0d69eb
-
SHA1
4967f22cd5e2abfe22dc7508b0106431d20ee9d5
-
SHA256
da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d
-
SHA512
a494f8b265fe92adb08ea28605d70ad7309b9477593e0937bd872d4549719d081d2036b7a16b715d4fd3d5a5dba9333f3b831b7f51dce27076b7849004f07cab
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaky:7rKo4ZwCOnYjVmJPaV
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exedescription pid process target process PID 3108 set thread context of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exepid process 4596 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe 4596 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe 4596 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe 4596 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe 4596 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exedescription pid process target process PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe PID 3108 wrote to memory of 4596 3108 da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe"C:\Users\Admin\AppData\Local\Temp\da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\da57cf598b74b967f562900ebaec99c7c28915d3d5b31e380dcd84b56b61c85d.exe
- Suspicious use of SetWindowsHookEx
PID:4596