Analysis
-
max time kernel
234s -
max time network
247s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:28
Static task
static1
Behavioral task
behavioral1
Sample
8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe
Resource
win10v2004-20221111-en
General
-
Target
8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe
-
Size
1.3MB
-
MD5
ee49af31873fbd7288a1cea4f2fbe9b1
-
SHA1
4ac4eb880cf2ab48acffabaa3079bf55e842fa53
-
SHA256
8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013
-
SHA512
492b44dfc9502da65135e74ae173a22bbc3a2c2a0113ee470dd6c9d670b7551b6e4beb7ab37267f2b233830e72102ad5c9f7090e27e55fd416f80634e5f30d2a
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakw:TrKo4ZwCOnYjVmJPaz
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exedescription pid process target process PID 2744 set thread context of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exepid process 4428 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 4428 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 4428 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 4428 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 4428 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exedescription pid process target process PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe PID 2744 wrote to memory of 4428 2744 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe 8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe"C:\Users\Admin\AppData\Local\Temp\8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\8dcd851334b5d78c35df71cc5435b0e4410d2f830e6e6f39da8838552d6de013.exe
- Suspicious use of SetWindowsHookEx
PID:4428