Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:59
Static task
static1
Behavioral task
behavioral1
Sample
2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe
Resource
win10v2004-20220901-en
General
-
Target
2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe
-
Size
32KB
-
MD5
195d8cc2267a75f5b93ebf58a301cd0c
-
SHA1
4a8241f367f080b577dea46dcd1e20c0644f758e
-
SHA256
2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f
-
SHA512
bd1909518f60d28f7645782d3d79fae345ffd5c170e6a298994e9098b5eb4329739bd974a4e17f1ad98915da6a81ff40cd7b7b47106aa7ff1e459d7cb7aa2feb
-
SSDEEP
384:rBThOkRJrSGr1gO8i4Rjwf/1HwzQOZDybVcRPLMgE:rDOkRV9r1gbN4/Sj6c5QL
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exedescription pid process target process PID 3224 set thread context of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe -
Modifies registry class 1 IoCs
Processes:
2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exeOpenWith.exepid process 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 1520 OpenWith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exedescription pid process target process PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe PID 3224 wrote to memory of 1296 3224 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe 2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe"C:\Users\Admin\AppData\Local\Temp\2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exeC:\Users\Admin\AppData\Local\Temp\2481d812ceadae4fab98f056bb36dd3ded871610d7f6dbe38e8bbaddf6c9b19f.exe2⤵
- Modifies registry class
PID:1296
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1520