Analysis
-
max time kernel
151s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:47
Static task
static1
Behavioral task
behavioral1
Sample
a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe
Resource
win10v2004-20220812-en
General
-
Target
a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe
-
Size
1.3MB
-
MD5
2f40f93efd87c9e645d86f36858bbd2c
-
SHA1
c8d8aa32a1145d1f27f4da6591742b8e9a532005
-
SHA256
a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e
-
SHA512
1e15692ac15b5b6d02e79c8e48d2fc6554cb9772656099aaf2d23b300ae83a6f2ffc5745c917ce69fd6a3f0c49f0817d4d5f280d68c990a316d2fde052bf757f
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakt:zrKo4ZwCOnYjVmJPam
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exedescription pid process target process PID 3216 set thread context of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exepid process 4380 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe 4380 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe 4380 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe 4380 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe 4380 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exedescription pid process target process PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe PID 3216 wrote to memory of 4380 3216 a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe"C:\Users\Admin\AppData\Local\Temp\a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\a7f64b61bade54ed0206433fe0b80675e3caecc901ee893ed19a96a45ff1e54e.exe
- Suspicious use of SetWindowsHookEx
PID:4380
-