Analysis
-
max time kernel
165s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:31
Static task
static1
Behavioral task
behavioral1
Sample
d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe
Resource
win10v2004-20221111-en
General
-
Target
d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe
-
Size
1.3MB
-
MD5
3a96831334c849dd69c61df03bf529ff
-
SHA1
41fed523fa4a90bd54e5004638234e8462577656
-
SHA256
d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107
-
SHA512
894610811fa67f8502914d04f2f72975d5ca5f68dd25bfd4acf20083f4e74d59ce8cccc45aba0eb5b6f0af069d03114061d1cccd403f987da9186524874ff92e
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaks:TrKo4ZwCOnYjVmJPa3
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exedescription pid process target process PID 2908 set thread context of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exepid process 2820 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe 2820 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe 2820 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe 2820 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe 2820 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exedescription pid process target process PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe PID 2908 wrote to memory of 2820 2908 d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe"C:\Users\Admin\AppData\Local\Temp\d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\d72c969aeea0292f6ab2f644e864a9c0ecab6652916e0b3cd5b1fa14f5cab107.exe
- Suspicious use of SetWindowsHookEx
PID:2820