Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:11
Static task
static1
Behavioral task
behavioral1
Sample
9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe
Resource
win10v2004-20220812-en
General
-
Target
9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe
-
Size
1.3MB
-
MD5
522c76c25bf7c56bf8d825bbdcfd6c17
-
SHA1
b2c216ddaa566b37eb52b3694ccc4f26e67016fe
-
SHA256
9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6
-
SHA512
1fd97012f238a5f7ffc09302e1454903f63d28b0de5474626770da77c3e9f2f8a9cb91e6ce7411cccea40b14d31750d37dd682d110007bb6461bea8041d0f477
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakn:jrKo4ZwCOnYjVmJPac
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exedescription pid process target process PID 4952 set thread context of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exepid process 4884 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 4884 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 4884 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 4884 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 4884 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exedescription pid process target process PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe PID 4952 wrote to memory of 4884 4952 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe 9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe"C:\Users\Admin\AppData\Local\Temp\9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\9875cdd83696d2fdd7704dab6e2b326dd45a9f82d3fedcc841c229d019d7ace6.exe
- Suspicious use of SetWindowsHookEx
PID:4884