Analysis
-
max time kernel
152s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:21
Static task
static1
Behavioral task
behavioral1
Sample
2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe
Resource
win10v2004-20221111-en
General
-
Target
2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe
-
Size
1.6MB
-
MD5
e4daebfdd8cb53fa9b20a525cff64450
-
SHA1
35252f3f17baeb25098094e2613b95e222a71858
-
SHA256
2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef
-
SHA512
b5764ed29f72a64f4f440596b00ce33446820c9dae096af5ac7371cace09e8a60d3fca819a73c8e3a51587a0608513984daeff5477194f907cc190eb75a66339
-
SSDEEP
24576:BzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYc:T6/ye0PIphrp9Zuvjqa0Uidj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exedescription pid process target process PID 2676 set thread context of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exepid process 5112 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 5112 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 5112 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 5112 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 5112 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exedescription pid process target process PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe PID 2676 wrote to memory of 5112 2676 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe 2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe"C:\Users\Admin\AppData\Local\Temp\2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe"C:\Users\Admin\AppData\Local\Temp\2589401212ab9a81a792e482a233fb1f4e86855bb27a6d37332fa6ef8e70f1ef.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:5112
-