Analysis
-
max time kernel
296s -
max time network
321s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:47
Static task
static1
Behavioral task
behavioral1
Sample
3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe
Resource
win10v2004-20221111-en
General
-
Target
3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe
-
Size
1.3MB
-
MD5
5f4d9584f30100bdeff09859401256f3
-
SHA1
25d3a169a3f0eeeea33b57502da2b66c7f22f20c
-
SHA256
3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9
-
SHA512
2032362a6b2316cb70465c8a77f9c4dc944812a0fda3cb4a6566c583342ef14ef8e84d0af033311020e9d94f7b443ff5262c41cb59bcde3650effd40dff9d858
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak1:jrKo4ZwCOnYjVmJPaS
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exedescription pid process target process PID 320 set thread context of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exepid process 1852 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 1852 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 1852 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 1852 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 1852 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exedescription pid process target process PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe PID 320 wrote to memory of 1852 320 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe 3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe"C:\Users\Admin\AppData\Local\Temp\3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\3a4be2df4ac9f20e8ceea21754b8df200c831709c0f852d50fb676be6c04dca9.exe
- Suspicious use of SetWindowsHookEx
PID:1852