Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:38
Static task
static1
Behavioral task
behavioral1
Sample
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
Resource
win10v2004-20220812-en
General
-
Target
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
-
Size
1.3MB
-
MD5
ec3b14142e8bf93c5c8a8f55ee3090ac
-
SHA1
7d489c8912293cddfae24616180ac03709d43a54
-
SHA256
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629
-
SHA512
e913996489b439fdd09f705374c87a9ced846687dad0c1b745f5d1a724f5681da32a8dfb7b37f75ca978609206a8f8deae5bcb03cb91d6cf2833f0d6b02c3478
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak4:7rKo4ZwCOnYjVmJPav
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exedescription pid process target process PID 3180 set thread context of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exepid process 4276 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 4276 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 4276 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 4276 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 4276 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exedescription pid process target process PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 3180 wrote to memory of 4276 3180 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe"C:\Users\Admin\AppData\Local\Temp\8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4276-132-0x0000000000000000-mapping.dmp
-
memory/4276-133-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/4276-134-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/4276-135-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/4276-136-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/4276-137-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB