Analysis
-
max time kernel
113s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:43
Static task
static1
Behavioral task
behavioral1
Sample
62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe
Resource
win10v2004-20220812-en
General
-
Target
62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe
-
Size
1.3MB
-
MD5
6c518b5b822572be8a07e482a5bc9827
-
SHA1
32e9c17e17d8d4327f3a43cf9c9d05c7c3cf951e
-
SHA256
62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8
-
SHA512
cda6c9433291ea864c965670596b569165740cd637fffebfd568981bae1ba4e08852b085a14c16434e3ecb4e739402926ac12739279b74c0206d60f94a91efe2
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPako:zrKo4ZwCOnYjVmJPaP
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exedescription pid process target process PID 4204 set thread context of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exepid process 4888 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 4888 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 4888 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 4888 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 4888 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exedescription pid process target process PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe PID 4204 wrote to memory of 4888 4204 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe 62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe"C:\Users\Admin\AppData\Local\Temp\62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\62abe19da9c1004aee619b75ab1341321d8d2d6143e9b43a9b266ee0adafeda8.exe
- Suspicious use of SetWindowsHookEx
PID:4888
-