Analysis
-
max time kernel
101s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:57
Static task
static1
Behavioral task
behavioral1
Sample
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe
Resource
win10v2004-20220812-en
General
-
Target
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe
-
Size
1.6MB
-
MD5
9ca3ca3f3dcd130c9982f246a7d361a7
-
SHA1
e6dc73bc59794df8f5555f546f75def83c24593f
-
SHA256
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4
-
SHA512
cddc99a4d31b5aa7b5ae3a5ef80554a87fab16d0d2c6218226564214ce625697df9a0a879ece1648b5e27be31aac65176e50629c7d8f89a1b3be1c29dbcb6d8b
-
SSDEEP
24576:NzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUY:n6/ye0PIphrp9Zuvjqa0Uid
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exedescription pid process target process PID 1728 set thread context of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exepid process 4100 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe 4100 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe 4100 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe 4100 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe 4100 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exedescription pid process target process PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1728 wrote to memory of 4100 1728 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe"C:\Users\Admin\AppData\Local\Temp\c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe"C:\Users\Admin\AppData\Local\Temp\c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4100