Analysis
-
max time kernel
188s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:41
Static task
static1
Behavioral task
behavioral1
Sample
3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe
Resource
win10v2004-20221111-en
General
-
Target
3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe
-
Size
1.3MB
-
MD5
efa9a20af15b620842994a33acbc247d
-
SHA1
91182887a8986d71e004c68a9ac7531d04871d0d
-
SHA256
3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8
-
SHA512
8c5d8911db6816f64e6c9ee6b99daec08dcd94ee618df92f9185fda066ec6bcb6e742ee6cf23a2b9ed5e836ca8dbfd461081553a3ae16502360a36aa133c1598
-
SSDEEP
24576:LrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaku:LrKo4ZwCOnYjVmJPap
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exedescription pid process target process PID 1640 set thread context of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exepid process 552 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 552 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 552 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 552 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 552 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exedescription pid process target process PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe PID 1640 wrote to memory of 552 1640 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe 3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe"C:\Users\Admin\AppData\Local\Temp\3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\3e8148780af9b96755a9e6688678870928a46bc310d996710c6f050d22d2b3d8.exe
- Suspicious use of SetWindowsHookEx
PID:552