Analysis
-
max time kernel
149s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:57
Static task
static1
Behavioral task
behavioral1
Sample
58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe
Resource
win10v2004-20220812-en
General
-
Target
58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe
-
Size
1.3MB
-
MD5
ff69ff919dc7bc8af2b4692d0a686297
-
SHA1
0ce4f6c2abee577c164a5af9ee139fd08383e24b
-
SHA256
58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3
-
SHA512
6436cf309225f1a7a17a7faf079004618a3e927b56acc77cbf2fe71a34e714e2f584288a7d9d1b18d6410b5aa740621a9fe80da89378611c27f48aa30853db77
-
SSDEEP
24576:DrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakT:DrKo4ZwCOnYjVmJPaU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exedescription pid process target process PID 1944 set thread context of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exepid process 2276 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 2276 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 2276 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 2276 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 2276 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exedescription pid process target process PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe PID 1944 wrote to memory of 2276 1944 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe 58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe"C:\Users\Admin\AppData\Local\Temp\58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\58f83e432157eb997186afdd85aaddd72a10d652f1ae7e46924529b356f46ae3.exe
- Suspicious use of SetWindowsHookEx
PID:2276