Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:19
Static task
static1
Behavioral task
behavioral1
Sample
26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe
Resource
win10v2004-20220901-en
General
-
Target
26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe
-
Size
1.3MB
-
MD5
6eec5e467e0b8735791e518344e61af9
-
SHA1
e05d5d6445e6d28e93a550386e678ca7b5527356
-
SHA256
26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd
-
SHA512
edc83f0f830a16a780e51c7f9186bcdc183a095567476b44bd3bc663a00e02680fbcfe0549a77bb5cab33a625c4889ccb57ef012a58319e1267d4515b646b4ac
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:zrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exedescription pid process target process PID 4928 set thread context of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exepid process 4940 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 4940 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 4940 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 4940 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 4940 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exedescription pid process target process PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe PID 4928 wrote to memory of 4940 4928 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe 26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe"C:\Users\Admin\AppData\Local\Temp\26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\26aa13c4e9640687d6d8d7c1922ab6b57e75dd4c8f015ce87fd51df2256cbafd.exe
- Suspicious use of SetWindowsHookEx
PID:4940
-