Analysis
-
max time kernel
130s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:14
Static task
static1
Behavioral task
behavioral1
Sample
7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe
Resource
win10v2004-20220812-en
General
-
Target
7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe
-
Size
1.3MB
-
MD5
dbca9dc563b6191ce3b73fefdb6b0940
-
SHA1
d91de8382b21347ef78327d8305515c32f027ce8
-
SHA256
7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353
-
SHA512
d3c5d35d6356980b5975d3373ec00d7a3440c4636f1f0e1a97fec5f66449b65d404cb9d6e0f4350a8a7f2a4a3873b7d7007826bd25d13b9092efb3913cf8c6b8
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakQ:zrKo4ZwCOnYjVmJPav
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exedescription pid process target process PID 1828 set thread context of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exepid process 3836 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 3836 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 3836 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 3836 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 3836 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exedescription pid process target process PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe PID 1828 wrote to memory of 3836 1828 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe 7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe"C:\Users\Admin\AppData\Local\Temp\7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\7471f429b8660fd42ab19f2b39cbe8c65b6ba6f80ac010ad736d2ad8b9879353.exe
- Suspicious use of SetWindowsHookEx
PID:3836