Analysis
-
max time kernel
163s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:12
Static task
static1
Behavioral task
behavioral1
Sample
2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe
Resource
win10v2004-20221111-en
General
-
Target
2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe
-
Size
1.3MB
-
MD5
e525c8e681175369706c8eebc4fe1072
-
SHA1
8c75adf02eb7a9d05f4d1f1f58292a3df3a69fa6
-
SHA256
2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b
-
SHA512
aef7285619a986882b884c9f0c83492781c3e9b0c2114a4c79bb5bc8b324684d50ece4a0557f955210efbb12f12d4b98f0087e4f8f57b8532c9f8d94c0145adf
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaka:7rKo4ZwCOnYjVmJPaB
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exedescription pid process target process PID 920 set thread context of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exepid process 216 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 216 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 216 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 216 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 216 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exedescription pid process target process PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe PID 920 wrote to memory of 216 920 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe 2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe"C:\Users\Admin\AppData\Local\Temp\2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\2ae74153ff85cc986905485604d321412d56863c53a16145ee99c0ab2ecc7e7b.exe
- Suspicious use of SetWindowsHookEx
PID:216
-