Analysis
-
max time kernel
183s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:29
Static task
static1
Behavioral task
behavioral1
Sample
b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe
Resource
win10v2004-20221111-en
General
-
Target
b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe
-
Size
1.6MB
-
MD5
850a619103f0f04d02667e04b6939257
-
SHA1
08a04e0854e75b86e745ae7aea81ec7fe06b816f
-
SHA256
b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469
-
SHA512
9791655b237e21c0d550df6366fe407d6462d2cb2f06294728e39bcefdcfcae260e0d9d2a232533156519d95657827800ab11bcc215443fcee8bb76ae6803db6
-
SSDEEP
24576:RzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUY:j6/ye0PIphrp9Zuvjqa0Uid
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exedescription pid process target process PID 1808 set thread context of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exepid process 1836 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe 1836 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe 1836 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe 1836 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe 1836 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exedescription pid process target process PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe PID 1808 wrote to memory of 1836 1808 b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe"C:\Users\Admin\AppData\Local\Temp\b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe"C:\Users\Admin\AppData\Local\Temp\b24a1211a59a737b797ea21c659da64d1bc032af1369de5c4efaa78984831469.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1836