Analysis
-
max time kernel
153s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:37
Static task
static1
Behavioral task
behavioral1
Sample
d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe
Resource
win10v2004-20221111-en
General
-
Target
d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe
-
Size
1.3MB
-
MD5
ddbe91bdd410f18139fb53e2fc5d2b4c
-
SHA1
8a35b53f622b30f6884b801ebf6abc70ffdb8154
-
SHA256
d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18
-
SHA512
2c81d7ceaa8d58e6e1d86c90eedc7e5504ca587ec4d5941f5aaa9dd8cc3abf6e7e7f3e97c7b79072b747933e4fe417cf3b95cbcd4b0b4b90794dd5b26bd60538
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakb:zrKo4ZwCOnYjVmJPaE
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exedescription pid process target process PID 1476 set thread context of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exepid process 4520 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe 4520 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe 4520 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe 4520 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe 4520 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exedescription pid process target process PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe PID 1476 wrote to memory of 4520 1476 d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe"C:\Users\Admin\AppData\Local\Temp\d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\d24ffab181801df66f90e2a5dcddf1b96cda8bbc0b2fcd74c32e23599fbc0c18.exe
- Suspicious use of SetWindowsHookEx
PID:4520