Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:34
Static task
static1
Behavioral task
behavioral1
Sample
8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe
Resource
win10v2004-20221111-en
General
-
Target
8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe
-
Size
1.6MB
-
MD5
2694a0321ae609a351b9b46b1819edef
-
SHA1
d1488ae381a1c98f5c54be63d4576ab3e960e54a
-
SHA256
8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da
-
SHA512
e044cceb3feece83e6e0a5ad013c019ba408da82e9dc33cdc9f679b5fa5a3434236f4e561f5c0c00e8132fb2aa4c608d788df6912ae32d3a19bbc59c9209f529
-
SSDEEP
24576:BzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYB:T6/ye0PIphrp9Zuvjqa0UidsT
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exedescription pid process target process PID 4704 set thread context of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exepid process 2276 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 2276 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 2276 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 2276 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 2276 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exedescription pid process target process PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe PID 4704 wrote to memory of 2276 4704 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe 8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe"C:\Users\Admin\AppData\Local\Temp\8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe"C:\Users\Admin\AppData\Local\Temp\8a546b5936ee420c9d1759fca943209887c848f8f9e2de802f17fc31adfc79da.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2276