Analysis
-
max time kernel
199s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:48
Static task
static1
Behavioral task
behavioral1
Sample
39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe
Resource
win10v2004-20221111-en
General
-
Target
39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe
-
Size
1.6MB
-
MD5
e7c8a09f6c53495db52a1e22f01131ee
-
SHA1
43e6ca5e0f94b5f8fd81a6c472727ea94bc01227
-
SHA256
39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0
-
SHA512
25afabb767bef18a02b35a781b08d100910f52b1f9fbfefeb0a7c2b76443cd3aaffcc4a87df9f5b269d18955a23aa69ec165fb6f1e9bf94f46e68009ab1b2877
-
SSDEEP
24576:NzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYh:n6/ye0PIphrp9Zuvjqa0UidK
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exedescription pid process target process PID 628 set thread context of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exepid process 2000 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 2000 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 2000 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 2000 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 2000 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exedescription pid process target process PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe PID 628 wrote to memory of 2000 628 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe 39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe"C:\Users\Admin\AppData\Local\Temp\39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe"C:\Users\Admin\AppData\Local\Temp\39e2ce5188121048197186ef4807c19784462ede1a6923b74de393dba8d313e0.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2000
-