Analysis
-
max time kernel
161s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:36
Static task
static1
Behavioral task
behavioral1
Sample
41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe
Resource
win10v2004-20220812-en
General
-
Target
41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe
-
Size
1.3MB
-
MD5
796f87828492c0b36bab37b70c4fe73b
-
SHA1
977ab64ee2d71b8478181974e56ea314c85451d5
-
SHA256
41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8
-
SHA512
e11bcc3f5c7b64cbeb440596707beefb43a4288aab30b72a53f15f23383c58aeba8eebe5618b58d2a7d2ea743ead5541dfddae903d46b86a7abc23b0bd54c33e
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakI:TrKo4ZwCOnYjVmJPaj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exedescription pid process target process PID 1128 set thread context of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exepid process 1348 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 1348 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 1348 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 1348 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 1348 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exedescription pid process target process PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe PID 1128 wrote to memory of 1348 1128 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe 41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe"C:\Users\Admin\AppData\Local\Temp\41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\41330819869f94bd6fa839e7f5780a01c2d27c060e711c8046eff7bd870489c8.exe
- Suspicious use of SetWindowsHookEx
PID:1348