Analysis
-
max time kernel
145s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:47
Static task
static1
Behavioral task
behavioral1
Sample
3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe
Resource
win10v2004-20220812-en
General
-
Target
3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe
-
Size
1.3MB
-
MD5
eca0b90564dc4b90c42ba97ecdf7ffac
-
SHA1
ee339d324806d89520b5b7c520ad895cc8fd938a
-
SHA256
3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66
-
SHA512
da6f4768b27c9843aaa5f0988e4c09dfbc7825646a6d2b5bfe21e5fea755c52012eb0721671e71305b3a90c9005264b424e839642782e3ade45f985dff279df8
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaky:jrKo4ZwCOnYjVmJPaV
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exedescription pid process target process PID 704 set thread context of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exepid process 1840 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 1840 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 1840 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 1840 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 1840 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exedescription pid process target process PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe PID 704 wrote to memory of 1840 704 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe 3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe"C:\Users\Admin\AppData\Local\Temp\3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\3ad72b669b26c36153d6207c9af728113275f941dbe97201652f6d1c7ce0be66.exe
- Suspicious use of SetWindowsHookEx
PID:1840