Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:47
Static task
static1
Behavioral task
behavioral1
Sample
1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe
Resource
win10v2004-20220901-en
General
-
Target
1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe
-
Size
1.3MB
-
MD5
2644af12e947b755576e7428213f6508
-
SHA1
6b0c89fdddba5c11bdcd91aac071648986601b4c
-
SHA256
1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3
-
SHA512
2bb14fefb0e83bf294cbfa8ec7cac2dcec4c1a1cde609ffd922bb54b5ae8c2c8c37f4ceeca1766e8124c87b34eb3dcf7619f9faa6632bf0dea7a5ad7ac40fdb0
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakV:TrKo4ZwCOnYjVmJPa6
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exedescription pid process target process PID 4880 set thread context of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exepid process 4796 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 4796 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 4796 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 4796 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 4796 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exedescription pid process target process PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe PID 4880 wrote to memory of 4796 4880 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe 1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe"C:\Users\Admin\AppData\Local\Temp\1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\1437ddbb1e2f3cc4edc172fbf39819bc5275948856ace2b1a43a4cbb27d603f3.exe
- Suspicious use of SetWindowsHookEx
PID:4796