Analysis
-
max time kernel
177s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:30
Static task
static1
Behavioral task
behavioral1
Sample
d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe
Resource
win10v2004-20221111-en
General
-
Target
d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe
-
Size
1.3MB
-
MD5
017d5009ca44d61d76151dc9fb0c3121
-
SHA1
cc1f5d9c62c74775fb706ba36ac4537fcb735409
-
SHA256
d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711
-
SHA512
2a344596909695b4650bb88612e1faf97699a0eb63898d9651784d638eba09568a21862b701b375612e7a33cbe7ed8406857eca3a7b173d2514505d3d909f790
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakg:TrKo4ZwCOnYjVmJPaL
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exedescription pid process target process PID 2888 set thread context of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exepid process 4060 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe 4060 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe 4060 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe 4060 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe 4060 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exedescription pid process target process PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe PID 2888 wrote to memory of 4060 2888 d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe"C:\Users\Admin\AppData\Local\Temp\d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\d7fb85f0bc8ee2765527d81359e911d22d1ba24b2e94eff1a2bdf236ab6f4711.exe
- Suspicious use of SetWindowsHookEx
PID:4060