Analysis
-
max time kernel
171s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:35
Static task
static1
Behavioral task
behavioral1
Sample
af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe
Resource
win10v2004-20220812-en
General
-
Target
af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe
-
Size
1.2MB
-
MD5
dd67e06011c4f4d4e3af22dd1c4904d0
-
SHA1
9f4e4bd2d04e60eb4ad3d619321d81630b688705
-
SHA256
af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59
-
SHA512
c0428e5917f44c7974b2ead77be0b28e9f06ebee388c59591816f7788d894e285beb928501298f6ea107c9b00e875481c0a58bcb7667be49b28e7859e019559b
-
SSDEEP
12288:tSGxzDKw6w2qa3LgMc8SLFDY/8LeS2899E7D3AYNACMzb7noKcxl4B6obXWRAfbL:sxw8wFDY3wE3wY6cxI6gWUbIwMLHf/2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exedescription pid process target process PID 5116 set thread context of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exepid process 4596 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe 4596 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe 4596 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe 4596 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe 4596 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exedescription pid process target process PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe PID 5116 wrote to memory of 4596 5116 af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe"C:\Users\Admin\AppData\Local\Temp\af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe"C:\Users\Admin\AppData\Local\Temp\af0532cb134de1927cdba34316386d7b05042d519409260984bb6b18eaac7a59.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4596