Analysis
-
max time kernel
188s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:38
Static task
static1
Behavioral task
behavioral1
Sample
657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe
Resource
win10v2004-20221111-en
General
-
Target
657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe
-
Size
1.3MB
-
MD5
fd7b0736a2601892a48bbcb2c508dc51
-
SHA1
3a8791326d06d543d65fcb1c2cae5931a86fb144
-
SHA256
657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400
-
SHA512
1302c09977aff4f7cef1a880d4bb338296334c32b5e94b04e9f9c1d8d841ec556901a91fb1c42040f30ff6ce7b20762ec89a12b6b6bd88637c0d0331172ac532
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:7rKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exedescription pid process target process PID 1768 set thread context of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exepid process 1256 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 1256 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 1256 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 1256 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 1256 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exedescription pid process target process PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe PID 1768 wrote to memory of 1256 1768 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe 657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe"C:\Users\Admin\AppData\Local\Temp\657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\657f84086d332a2f9f895417d9a96c785b8b9155cadee408261252a33092d400.exe
- Suspicious use of SetWindowsHookEx
PID:1256
-