Analysis
-
max time kernel
188s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:49
Static task
static1
Behavioral task
behavioral1
Sample
39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe
Resource
win10v2004-20221111-en
General
-
Target
39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe
-
Size
1.3MB
-
MD5
e5ff3dfd5e7207ba80f69335ca8bc578
-
SHA1
c1a320cb40b47b5c51723c724db527bdf78121e1
-
SHA256
39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b
-
SHA512
4faba412d7408c09e9ff24b951d36237025eec71f78178ad71354295c0aa3e291cdedd296be6f688031e9c7592add65eb6fbaad257ff6c5362060cf46dd42d38
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakG:zrKo4ZwCOnYjVmJPad
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exedescription pid process target process PID 4904 set thread context of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exepid process 2624 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 2624 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 2624 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 2624 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 2624 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exedescription pid process target process PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe PID 4904 wrote to memory of 2624 4904 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe 39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe"C:\Users\Admin\AppData\Local\Temp\39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\39ab8b8e90356079a4afb95621763356e21c36f7e31fec3ecade4a894683333b.exe
- Suspicious use of SetWindowsHookEx
PID:2624
-