Analysis
-
max time kernel
164s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:23
Static task
static1
Behavioral task
behavioral1
Sample
6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe
Resource
win10v2004-20221111-en
General
-
Target
6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe
-
Size
1.6MB
-
MD5
ae1966c793d02e50cf2c49bde290bec3
-
SHA1
4d7486b804a9c3c20d6b492b09ac4c3b4b6d9ddf
-
SHA256
6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222
-
SHA512
e3c0b407a51b070be1a552360278bc2d1848be4bdeda9318542da69faf581ae3bef84d0b35481b1505fce60b1c1bc7059c46e4cf647ef76bb48b72058f79cdac
-
SSDEEP
24576:NzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYD:n6/ye0PIphrp9Zuvjqa0UidA
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exedescription pid process target process PID 2260 set thread context of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exepid process 3492 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 3492 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 3492 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 3492 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 3492 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exedescription pid process target process PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe PID 2260 wrote to memory of 3492 2260 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe 6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe"C:\Users\Admin\AppData\Local\Temp\6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe"C:\Users\Admin\AppData\Local\Temp\6f07ea362852cee497e67b61e7eb9246087a0626cd06c9314e5ee2c7f0534222.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3492