Analysis
-
max time kernel
151s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:05
Static task
static1
Behavioral task
behavioral1
Sample
7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe
Resource
win10v2004-20220812-en
General
-
Target
7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe
-
Size
1.3MB
-
MD5
9dbc064f29e9922c8166d73df9e52482
-
SHA1
da8c938da985c96e6dc1386108033175e22bb56c
-
SHA256
7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369
-
SHA512
8e1f6f615f28a16f8351f941ff34809d339fa7168b1cb136a2fcaf65bb78fab7bf53f35a10634616004552db4f049e339e10756ebef5bc660e85333607ba1785
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakG:TrKo4ZwCOnYjVmJPa1
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exedescription pid process target process PID 4820 set thread context of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exepid process 1692 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 1692 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 1692 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 1692 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 1692 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exedescription pid process target process PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe PID 4820 wrote to memory of 1692 4820 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe 7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe"C:\Users\Admin\AppData\Local\Temp\7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\7968e1b7110cb38f606cccb15d130ffcb97ba6df129fe68752462905ecc05369.exe
- Suspicious use of SetWindowsHookEx
PID:1692
-