Analysis
-
max time kernel
151s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:16
Static task
static1
Behavioral task
behavioral1
Sample
72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe
Resource
win10v2004-20221111-en
General
-
Target
72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe
-
Size
1.3MB
-
MD5
d7023932928aa458ddbec429494b1cce
-
SHA1
7ded327e5733797f2e7a366c53411d2d4ed8ccc4
-
SHA256
72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f
-
SHA512
5114eb477c56bbd1f70318d7723475c8bd54fdff6d559f2d798a2ab2f50ee2b8e8d64a1e2daff264cd18b04ac0ef9d26f39727c91b7839009438f5a077d48a79
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaky:zrKo4ZwCOnYjVmJPaR
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exedescription pid process target process PID 3204 set thread context of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exepid process 4332 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 4332 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 4332 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 4332 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 4332 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exedescription pid process target process PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe PID 3204 wrote to memory of 4332 3204 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe 72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe"C:\Users\Admin\AppData\Local\Temp\72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\72e43add0f6b8605319495b562f0c7793b3c869dfec2cfc1a0192d65c0f5ed2f.exe
- Suspicious use of SetWindowsHookEx
PID:4332