Analysis
-
max time kernel
180s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:39
Static task
static1
Behavioral task
behavioral1
Sample
6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe
Resource
win10v2004-20220812-en
General
-
Target
6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe
-
Size
1.6MB
-
MD5
4b1e2d472b8fd3b3f74f4e38ff26b446
-
SHA1
b5d27da818739f8b473504498cb5dba3c1882fd7
-
SHA256
6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80
-
SHA512
bf9484f2cd12794ad51bd50223ad4cbc8f7294940d527d23543f5f6ff196e59c7355fcfdef21e8d2e8ada7e0b68f749464a4446ee5e887ef71511ff2e32d3b17
-
SSDEEP
24576:RzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUY/:j6/ye0PIphrp9Zuvjqa0Uid8
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exedescription pid process target process PID 4740 set thread context of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exepid process 4752 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 4752 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 4752 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 4752 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 4752 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exedescription pid process target process PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe PID 4740 wrote to memory of 4752 4740 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe 6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe"C:\Users\Admin\AppData\Local\Temp\6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe"C:\Users\Admin\AppData\Local\Temp\6515e36e104aab90ed3383365785c32fcd8a81f6bd9c17cfeaeec54c5418da80.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4752
-