Analysis
-
max time kernel
204s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:02
Static task
static1
Behavioral task
behavioral1
Sample
9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe
Resource
win10v2004-20221111-en
General
-
Target
9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe
-
Size
1.3MB
-
MD5
9cc3687b2ad8b73e865db58254627002
-
SHA1
ba01affaf731cbe93e34f68b9e33be172f86c526
-
SHA256
9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847
-
SHA512
2239b529b3d742e39cb5595a3500146f3ff56d2dd6cb4c11991d57409c308cfbdff7ddafb00fb0206bccf3a9ede215546152becfa9296a0e39bcad81428ad541
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:zrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exedescription pid process target process PID 952 set thread context of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exepid process 4808 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 4808 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 4808 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 4808 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 4808 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exedescription pid process target process PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe PID 952 wrote to memory of 4808 952 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe 9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe"C:\Users\Admin\AppData\Local\Temp\9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\9e4e7deb565d83edd6f3ddb8b9498c7b9047597a26ab90cb8d98a4e033ec2847.exe
- Suspicious use of SetWindowsHookEx
PID:4808