Analysis
-
max time kernel
212s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:39
Static task
static1
Behavioral task
behavioral1
Sample
3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe
Resource
win10v2004-20221111-en
General
-
Target
3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe
-
Size
1.3MB
-
MD5
61688eee3eb9fec39fcad4169c674c7e
-
SHA1
71fa0b5388c4b3ca1f4168f52e2fcd8a1e646de6
-
SHA256
3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e
-
SHA512
a672cbffc2d1f812891863ea4cda9a8f849e04078ae58ba0dd156fc3a2ba445b8100a81a96a4485b18b13d4c7710112e8d40e084ea80aa62baf5bdb25d5de4ab
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakW:zrKo4ZwCOnYjVmJPat
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exedescription pid process target process PID 2028 set thread context of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exepid process 2904 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 2904 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 2904 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 2904 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 2904 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exedescription pid process target process PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe PID 2028 wrote to memory of 2904 2028 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe 3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe"C:\Users\Admin\AppData\Local\Temp\3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3fb84043a511077ed6da4fdf0cd1f51740ad5fe72be31f17683b6dc66fbbf72e.exe
- Suspicious use of SetWindowsHookEx
PID:2904