Analysis
-
max time kernel
183s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:35
Static task
static1
Behavioral task
behavioral1
Sample
d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe
Resource
win10v2004-20221111-en
General
-
Target
d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe
-
Size
1.3MB
-
MD5
75bf989051310e0f3f960f6b6e4152b0
-
SHA1
ba78e7e127773c5d72d824b30bd7a9ac8c19f6ea
-
SHA256
d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78
-
SHA512
b0500eb2ea3f6090d39b58c24898dfb7d54ef378b6d0b01ca6ffebab09d7ee0b5aed97d2f1df80316099d3dd8ce55b5041ca69e8fecfaeb9c1541a7a42604e81
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakf:TrKo4ZwCOnYjVmJPaQ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exedescription pid process target process PID 1952 set thread context of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exepid process 2196 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe 2196 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe 2196 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe 2196 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe 2196 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exedescription pid process target process PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe PID 1952 wrote to memory of 2196 1952 d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe"C:\Users\Admin\AppData\Local\Temp\d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\d413cdd9e025b7528e956c3e7efde295ad3d7157397d1d7655cd9a0825539b78.exe
- Suspicious use of SetWindowsHookEx
PID:2196