Analysis
-
max time kernel
205s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:04
Static task
static1
Behavioral task
behavioral1
Sample
9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe
Resource
win10v2004-20221111-en
General
-
Target
9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe
-
Size
1.3MB
-
MD5
cb8122d487c1362835a2e5a6d243c14e
-
SHA1
7592e09aa53189c840cf04937ab4c4e21bd68095
-
SHA256
9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb
-
SHA512
b03b2b0d5062eacb19057891d4a4a4911fc175e1c16b73daef9391c444f0a4925f4d4fce0ec773275fe87e1c095dbe2f8f89aee7d232304f2e8fcfd61953fa50
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPake:TrKo4ZwCOnYjVmJPaJ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exedescription pid process target process PID 3092 set thread context of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exepid process 4168 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 4168 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 4168 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 4168 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 4168 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exedescription pid process target process PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe PID 3092 wrote to memory of 4168 3092 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe 9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe"C:\Users\Admin\AppData\Local\Temp\9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\9d12ace275f52a884d7c6ac1b9c37b2b430bf777813ee2999319c8df66afaeeb.exe
- Suspicious use of SetWindowsHookEx
PID:4168