Analysis
-
max time kernel
144s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:27
Static task
static1
Behavioral task
behavioral1
Sample
d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe
Resource
win10v2004-20220812-en
General
-
Target
d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe
-
Size
1.3MB
-
MD5
efa882b2c6b5dac89333afe434fba5ff
-
SHA1
cc3c500cc6cffbfcd342bf828b67780873de5487
-
SHA256
d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268
-
SHA512
01e3d3b609aea00158dec2448c508670c294a6043934373e7bc32f49b6c4497f50c30aad3d24c8fdc4d33e50a91f470c94a232d235ddd6ce16b8675d8f1dc1ae
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakV:zrKo4ZwCOnYjVmJPai
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exedescription pid process target process PID 2576 set thread context of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exepid process 5088 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe 5088 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe 5088 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe 5088 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe 5088 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exedescription pid process target process PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe PID 2576 wrote to memory of 5088 2576 d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe"C:\Users\Admin\AppData\Local\Temp\d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\d9e91c054173883b34c4d9ac8807510a67cd2a22b003f335117f66c38ca8a268.exe
- Suspicious use of SetWindowsHookEx
PID:5088