Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:26
Static task
static1
Behavioral task
behavioral1
Sample
da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe
Resource
win10v2004-20220901-en
General
-
Target
da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe
-
Size
1.3MB
-
MD5
e2eb763eb093d30ded87c036c672482e
-
SHA1
de16b5533c59e28bbb06a4097fe26a6e8755c2e9
-
SHA256
da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e
-
SHA512
4e3b072208020d76cb5e4e30a65b8533fd718e78d2a418ffc82b8fe30f227d577a66e93a67c20d735552bce6cd5150bc094e121fe4134994913f1b42f9ce2708
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakY:zrKo4ZwCOnYjVmJPaj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exedescription pid process target process PID 2148 set thread context of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exepid process 3340 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe 3340 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe 3340 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe 3340 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe 3340 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exedescription pid process target process PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe PID 2148 wrote to memory of 3340 2148 da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe"C:\Users\Admin\AppData\Local\Temp\da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\da577c3a4238749bdf30dfd0a32c3d6558df496f09f666b3ebbe97d9ac4dac8e.exe
- Suspicious use of SetWindowsHookEx
PID:3340