Analysis
-
max time kernel
159s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:06
Static task
static1
Behavioral task
behavioral1
Sample
2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe
Resource
win10v2004-20221111-en
General
-
Target
2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe
-
Size
1.3MB
-
MD5
aa2128684928fef27d986b07bc0bdbce
-
SHA1
3aa1cf1d869315581a55076aec74196d9ebc8229
-
SHA256
2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3
-
SHA512
1ee83a2c22c9a7c5a5b14cef1a837ce85562b61d80687dc4dda685311a00e4980011d68631908ae1c5a9653310d37b1f1f12c115e79ba9fb096c20ce3ae393a4
-
SSDEEP
24576:rrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakN:rrKo4ZwCOnYjVmJPai
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exedescription pid process target process PID 2000 set thread context of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exepid process 2368 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2368 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2368 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2368 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2368 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exedescription pid process target process PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe PID 2000 wrote to memory of 2368 2000 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe 2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe"C:\Users\Admin\AppData\Local\Temp\2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\2f0de6ce62213392ea523e6c7a8da06c51c997fdc697c108b7ada8ba326a92c3.exe
- Suspicious use of SetWindowsHookEx
PID:2368
-