Analysis
-
max time kernel
183s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:26
Static task
static1
Behavioral task
behavioral1
Sample
8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe
Resource
win10v2004-20221111-en
General
-
Target
8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe
-
Size
1.3MB
-
MD5
746780277b4e6ca3d3bbe74d63e6625e
-
SHA1
d52173f32aaadd8b454f04f7591c2e0b36f935b5
-
SHA256
8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91
-
SHA512
eae10d393b9e49c3d12f3a44721fdc6d4e669056da5f2753c195918210353add684e3f42950998d7d4894b6387a97c92e9768d3bc96a0dacc4623c1e47aa1df8
-
SSDEEP
24576:brKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak6:brKo4ZwCOnYjVmJPa5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exedescription pid process target process PID 1260 set thread context of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exepid process 1992 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 1992 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 1992 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 1992 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 1992 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exedescription pid process target process PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe PID 1260 wrote to memory of 1992 1260 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe 8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe"C:\Users\Admin\AppData\Local\Temp\8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\8eebf8420bee73761a78814b6ef3345ed2e7f892067449cbba0070704bd4ca91.exe
- Suspicious use of SetWindowsHookEx
PID:1992