Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:42
Static task
static1
Behavioral task
behavioral1
Sample
cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe
Resource
win10v2004-20221111-en
General
-
Target
cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe
-
Size
1.3MB
-
MD5
a028c23523ea05da1d72ab01bfcaf648
-
SHA1
1f2763986426b6e8cbb9510a83daf56fdf4d89a3
-
SHA256
cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b
-
SHA512
f79d20cd75961e7d938612251ce1866d029a6738d715d07395ee397897e30c3e87c189286eba751aeebe10f650c61b15457ea7ad2f7eb3222dcc48504cc53f2a
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakj:jrKo4ZwCOnYjVmJPas
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exedescription pid process target process PID 460 set thread context of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exepid process 1216 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe 1216 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe 1216 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe 1216 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe 1216 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exedescription pid process target process PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe PID 460 wrote to memory of 1216 460 cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe"C:\Users\Admin\AppData\Local\Temp\cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\cf50df0a84631bfcd4fa83cd709375ec1acc35c719590d7883b537a5f69ebc6b.exe
- Suspicious use of SetWindowsHookEx
PID:1216