Analysis
-
max time kernel
157s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:40
Static task
static1
Behavioral task
behavioral1
Sample
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
Resource
win10v2004-20221111-en
General
-
Target
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
-
Size
1.3MB
-
MD5
9d20bc93fa446326d8aef30a77791bd9
-
SHA1
284c1428bd62454266a90f3ee2f042a474c4e2a2
-
SHA256
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f
-
SHA512
5a366aeb40e1cea2eb27a782af6c55178d3e49a438007fefacdba2226cf94daa852fe169853ab1dcb2da35e45b2bc33217ecffec21c6ee20996860877469f297
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:TrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exedescription pid process target process PID 5044 set thread context of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exepid process 5048 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe 5048 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe 5048 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe 5048 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe 5048 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exedescription pid process target process PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 5044 wrote to memory of 5048 5044 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe"C:\Users\Admin\AppData\Local\Temp\d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
- Suspicious use of SetWindowsHookEx
PID:5048