Analysis
-
max time kernel
184s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe
Resource
win10v2004-20221111-en
General
-
Target
19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe
-
Size
1.3MB
-
MD5
9b8da0747a29ee575bd50d2377bff8e3
-
SHA1
a313e903422a346fa1c62fa47772a3c0bbfaa874
-
SHA256
19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6
-
SHA512
910c835814a92bfd7aa1cbb8d80d826f9463691f42b02ba27493a2567454bedf3e98c889af88236472f32a467b41bfc42b825474ec8427d109b5e6b91ba8d5f0
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakD:zrKo4ZwCOnYjVmJPa4
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exedescription pid process target process PID 1740 set thread context of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exepid process 1500 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 1500 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 1500 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 1500 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 1500 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exedescription pid process target process PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe PID 1740 wrote to memory of 1500 1740 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe 19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe"C:\Users\Admin\AppData\Local\Temp\19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\19b9dd73208cfca4c93570c8bbe40d47b59ae1b11f508d6edda6cd89aaaba2d6.exe
- Suspicious use of SetWindowsHookEx
PID:1500