Analysis
-
max time kernel
286s -
max time network
321s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:19
Static task
static1
Behavioral task
behavioral1
Sample
93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe
Resource
win10v2004-20221111-en
General
-
Target
93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe
-
Size
1.3MB
-
MD5
5886043f98a399752a29f39fd2c55942
-
SHA1
944466cda36a0dd699b030bfb6d36bb3edbd72c9
-
SHA256
93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998
-
SHA512
232c15fe8d41ad699d067a097cb87f8a91161425f33bb6e9e1e2eb53adc4c0a68aefeed63b680d7d5d76058a9de22c11197301261f5089dc4023feeff3e107b6
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:TrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exedescription pid process target process PID 3520 set thread context of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exepid process 3200 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 3200 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 3200 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 3200 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 3200 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exedescription pid process target process PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe PID 3520 wrote to memory of 3200 3520 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe 93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe"C:\Users\Admin\AppData\Local\Temp\93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\93eb36dbc6633ded54b4d6a1c25dd1e3481a605bc17517ba2502942163b92998.exe
- Suspicious use of SetWindowsHookEx
PID:3200