Analysis
-
max time kernel
140s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:25
Static task
static1
Behavioral task
behavioral1
Sample
47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe
Resource
win10v2004-20220812-en
General
-
Target
47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe
-
Size
1.3MB
-
MD5
d8e40b5ad335330cdba325e354610b43
-
SHA1
d693b47f49134bb9ee702d8355bf051038cc4727
-
SHA256
47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26
-
SHA512
034fa6436162b4548ea385bb0c449dc74ee6ac6258c659dba6a91e71656358a8756503fc6a09146bbd2a58df50338f749b919c245bdec55f9891b09f020a5d48
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakg:jrKo4ZwCOnYjVmJPar
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exedescription pid process target process PID 4308 set thread context of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exepid process 3276 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 3276 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 3276 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 3276 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 3276 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exedescription pid process target process PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe PID 4308 wrote to memory of 3276 4308 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe 47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe"C:\Users\Admin\AppData\Local\Temp\47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\47feb37fd93c8b2fb2b14e1e45d0e8a8d51f7703b7fd9233745ea0fc398b0b26.exe
- Suspicious use of SetWindowsHookEx
PID:3276
-