Analysis
-
max time kernel
367s -
max time network
400s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:35
Static task
static1
Behavioral task
behavioral1
Sample
1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe
Resource
win10v2004-20221111-en
General
-
Target
1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe
-
Size
1.6MB
-
MD5
79e2124250c5220548dc15816789f835
-
SHA1
0129820fad465c5a231ea18ae5e0f0b363b584bb
-
SHA256
1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da
-
SHA512
6e08395d8e30453941c51c87f81b73c63f6be02fc9cd8a9cb4031867210080a1b8814fd21d57b0c1be969e1554df3ee67f4724dd893b6f87ce20e35d2520cb0b
-
SSDEEP
24576:NzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYc:n6/ye0PIphrp9Zuvjqa0Uid7
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exedescription pid process target process PID 4888 set thread context of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exepid process 1496 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1496 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1496 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1496 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1496 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exedescription pid process target process PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe PID 4888 wrote to memory of 1496 4888 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe 1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe"C:\Users\Admin\AppData\Local\Temp\1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe"C:\Users\Admin\AppData\Local\Temp\1cd146f6937bd07cc11df9d5ceedecd01810681aa3985835d6397a77c06c21da.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1496