Analysis
-
max time kernel
149s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:31
Static task
static1
Behavioral task
behavioral1
Sample
8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe
Resource
win10v2004-20221111-en
General
-
Target
8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe
-
Size
1.3MB
-
MD5
a80a4b3807d56cd98c226dcb14932b45
-
SHA1
cb7c3109800c72ada6247aedfac93f50e5046453
-
SHA256
8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745
-
SHA512
ff21fc827a99fe508192f6863d592351eee105ae590c498f83bc67f3010414d126f17dbcfd57d6d2f2523dfaacb3674e5ce9492fc6c5981c6902eee67ed3ad7d
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak8:7rKo4ZwCOnYjVmJPab
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exedescription pid process target process PID 4604 set thread context of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exepid process 4272 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 4272 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 4272 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 4272 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 4272 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exedescription pid process target process PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe PID 4604 wrote to memory of 4272 4604 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe 8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe"C:\Users\Admin\AppData\Local\Temp\8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\8c3b9f44297e60e02b4d4c0e9060ce1276ce5ae6b9d8caa8a3079a38fadd8745.exe
- Suspicious use of SetWindowsHookEx
PID:4272