Analysis
-
max time kernel
183s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:23
Static task
static1
Behavioral task
behavioral1
Sample
23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe
Resource
win10v2004-20221111-en
General
-
Target
23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe
-
Size
1.3MB
-
MD5
1e7cf8fb89c89f78dd5829d83e0e8abd
-
SHA1
cc9c5e80bb66c10ab102133b4adead90901133db
-
SHA256
23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861
-
SHA512
1598daf656916e7373142e3d901d417e703ac00ce95dd3a2a18eb555fd40a17d3c9c23f461da696af59f9d21f050406f442cf3b380a1cd00179e38e5ee97a8b4
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakx:TrKo4ZwCOnYjVmJPaa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exedescription pid process target process PID 4920 set thread context of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exepid process 2656 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 2656 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 2656 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 2656 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 2656 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exedescription pid process target process PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe PID 4920 wrote to memory of 2656 4920 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe 23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe"C:\Users\Admin\AppData\Local\Temp\23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\23d957ef46c22cc518164555a413d698838eb6bbf742fec3b32c77c21cace861.exe
- Suspicious use of SetWindowsHookEx
PID:2656
-