Analysis
-
max time kernel
297s -
max time network
349s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:42
Static task
static1
Behavioral task
behavioral1
Sample
aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe
Resource
win10v2004-20221111-en
General
-
Target
aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe
-
Size
1.3MB
-
MD5
6ef5ce16b260181a937e927ccd50eb65
-
SHA1
ec2c93cdd2ebb4550985422001a7ae112e8926be
-
SHA256
aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725
-
SHA512
e626bd0e6e2011c44392d751049a799cec5d0f3e1f14954af4e307661150ee3c512f34c57a3d56722aa7bb96cc15b8cf646a787822fef9846a0a300eb811f00c
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakT:zrKo4ZwCOnYjVmJPaM
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exedescription pid process target process PID 4416 set thread context of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exepid process 3308 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe 3308 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe 3308 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe 3308 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe 3308 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exedescription pid process target process PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe PID 4416 wrote to memory of 3308 4416 aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe"C:\Users\Admin\AppData\Local\Temp\aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\aada3cdd70139ff1e246318ccb2d08d78a6e85914f0ec78354b5252b5b71d725.exe
- Suspicious use of SetWindowsHookEx
PID:3308