Analysis
-
max time kernel
197s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:30
Static task
static1
Behavioral task
behavioral1
Sample
20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe
Resource
win10v2004-20221111-en
General
-
Target
20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe
-
Size
1.3MB
-
MD5
f66789dfe013c663cd74a98418dfcfe2
-
SHA1
0475960b8bf38744a2cad92d9919b039df315727
-
SHA256
20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf
-
SHA512
450db1f19f51f7b9f37dc5acdcbdd38e5fa14dc797be93b2c6a7a2fcd8bb169e438ba76e268c6a584c249f93240f3d352f2747c9684a3eb25f1da1e32c00ec2f
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak9:jrKo4ZwCOnYjVmJPaa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exedescription pid process target process PID 3960 set thread context of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exepid process 4904 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 4904 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 4904 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 4904 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 4904 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exedescription pid process target process PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe PID 3960 wrote to memory of 4904 3960 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe 20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe"C:\Users\Admin\AppData\Local\Temp\20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\20318d65f4ea158c9d9fddc1c4be6a23ce2575cea827e056a4671fa32a6b35cf.exe
- Suspicious use of SetWindowsHookEx
PID:4904