Analysis
-
max time kernel
190s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:28
Static task
static1
Behavioral task
behavioral1
Sample
d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe
Resource
win10v2004-20221111-en
General
-
Target
d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe
-
Size
1.3MB
-
MD5
6c2e8ec904c09e63df97d0912a658ba4
-
SHA1
8d9c4f0795ff806d26cce6cd97df9775a59955cf
-
SHA256
d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876
-
SHA512
30b2b995d73733de3bbe2ab27d42c940a270cc535dcf56f0eed4e026a4c079375b751dc0e443817d4d7d56b5e726688f4b7bdffbcc262d8b2133e860f837930f
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakA:7rKo4ZwCOnYjVmJPaf
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exedescription pid process target process PID 4556 set thread context of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exepid process 4048 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe 4048 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe 4048 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe 4048 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe 4048 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exedescription pid process target process PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe PID 4556 wrote to memory of 4048 4556 d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe"C:\Users\Admin\AppData\Local\Temp\d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\d91d5a351b2b23b75d16a8272df5313f2b0fe7cde78b203cf1b1aac3892e7876.exe
- Suspicious use of SetWindowsHookEx
PID:4048