Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:28
Static task
static1
Behavioral task
behavioral1
Sample
460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe
Resource
win10v2004-20221111-en
General
-
Target
460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe
-
Size
1.3MB
-
MD5
239dc40b3cbe1ab3faeb585a249dce6a
-
SHA1
29646b0ac218d59594c93278f002bdc519f0b16a
-
SHA256
460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05
-
SHA512
064ef735410d07b283d7f95aa3c136806e8c5fb90f403c58918ddb2c1d737327f7be73d1d6e3169e22f4ad4cd24e2ecbf395dc7f66cdc96b69e7b7e8dc70e9bc
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakf:7rKo4ZwCOnYjVmJPao
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exedescription pid process target process PID 4924 set thread context of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exepid process 4944 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 4944 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 4944 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 4944 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 4944 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exedescription pid process target process PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe PID 4924 wrote to memory of 4944 4924 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe 460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe"C:\Users\Admin\AppData\Local\Temp\460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\460c80b4008713da8c6398cff1d855e04336b5f22af70a6e7da93e40ab16ea05.exe
- Suspicious use of SetWindowsHookEx
PID:4944
-