Analysis
-
max time kernel
167s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:43
Static task
static1
Behavioral task
behavioral1
Sample
168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe
Resource
win10v2004-20220812-en
General
-
Target
168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe
-
Size
1.3MB
-
MD5
b443924c7184eb90f39ed0a579506140
-
SHA1
2315278f8431f50e171d2d476889e03e66f028e4
-
SHA256
168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca
-
SHA512
335cc0fe15c298ed8b5856b0bc14cd00b3d2b20375032d9c45878ed1f1464cf7c9de8ed57c89012cc1c7d5db9099bf0e4280b8f79b87221eed092602e1bf8135
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:TrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exedescription pid process target process PID 4200 set thread context of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exepid process 2588 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 2588 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 2588 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 2588 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 2588 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exedescription pid process target process PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe PID 4200 wrote to memory of 2588 4200 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe 168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe"C:\Users\Admin\AppData\Local\Temp\168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\168aa891bcfa359ab947e9bef0c29442acf4d0d58a6d62bc88b40095257fa4ca.exe
- Suspicious use of SetWindowsHookEx
PID:2588