Analysis
-
max time kernel
149s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:18
Static task
static1
Behavioral task
behavioral1
Sample
71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe
Resource
win10v2004-20220812-en
General
-
Target
71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe
-
Size
1.6MB
-
MD5
33981d52d9c0af7290c7edbcad9ef09b
-
SHA1
6a61231470c8dc81a926a9a532a8e01cbaeac87e
-
SHA256
71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2
-
SHA512
4a9a2dc8605687c4311ce20e92a611df8fdd1b3e272413d12e150aa87e9462cf498ab02a9b72469fc4ef7eef2397771a3eed060ae34077e44f1300d8a5e3d7b5
-
SSDEEP
24576:BzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYl:T6/ye0PIphrp9Zuvjqa0Uid2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exedescription pid process target process PID 4772 set thread context of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exepid process 4792 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 4792 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 4792 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 4792 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 4792 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exedescription pid process target process PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe PID 4772 wrote to memory of 4792 4772 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe 71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe"C:\Users\Admin\AppData\Local\Temp\71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe"C:\Users\Admin\AppData\Local\Temp\71b8737a12be9f038742877010ea82cfec550d255763f55057933048374e63b2.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4792