Analysis
-
max time kernel
183s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:31
Static task
static1
Behavioral task
behavioral1
Sample
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
Resource
win10v2004-20221111-en
General
-
Target
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
-
Size
1.1MB
-
MD5
296f390eb34cc053e6c787f209382e91
-
SHA1
306bd0d215be7e89452c58bcf93ee6ee633629ae
-
SHA256
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f
-
SHA512
ab57f16377108f1c5a1eaa57ddf22efe5414e7160af4da1f18aced00a2c3f069f3735e834fb20680787a17b81bc71a2e5b0fa1f51c53063e982ec284db28b4cf
-
SSDEEP
24576:zjmOztIjpVbUJ44R/DDK2s5mNZRzOUCrA/N3rb:zqAtI704g/D3Tm03P
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exedescription pid process target process PID 2252 set thread context of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exepid process 4168 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe 4168 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe 4168 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe 4168 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe 4168 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exedescription pid process target process PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 2252 wrote to memory of 4168 2252 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe"C:\Users\Admin\AppData\Local\Temp\a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
- Suspicious use of SetWindowsHookEx
PID:4168
-