Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:55
Static task
static1
Behavioral task
behavioral1
Sample
3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe
Resource
win10v2004-20220901-en
General
-
Target
3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe
-
Size
1.3MB
-
MD5
57a83051518dcb7497f1d2c15cac81d8
-
SHA1
fee0d58f113fb36bdc5112ab05ac7aa168ae3664
-
SHA256
3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593
-
SHA512
0d24c80c5474366b085d4145de730edd38eaa29a6b362e27f7da1f6bac57686d0b79024bd71eb5388bebfd7ce05478b9f717e2f89cfda6e24138538d301c860e
-
SSDEEP
24576:KrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakK:KrKo4ZwCOnYjVmJPat
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exedescription pid process target process PID 1232 set thread context of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exepid process 1388 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 1388 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 1388 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 1388 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 1388 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exedescription pid process target process PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe PID 1232 wrote to memory of 1388 1232 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe 3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe"C:\Users\Admin\AppData\Local\Temp\3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\3570ddf2346b8804f9b5aafac2b42bbbb6069e18fa8832550759e1e5617b5593.exe
- Suspicious use of SetWindowsHookEx
PID:1388