Analysis
-
max time kernel
146s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 22:11
Static task
static1
Behavioral task
behavioral1
Sample
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe
Resource
win10v2004-20220812-en
General
-
Target
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe
-
Size
356KB
-
MD5
74e3ff0c5c8197632150eeec60cd7b31
-
SHA1
1f97492ee077619f12edd691d3da6cc664b9e8b5
-
SHA256
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93
-
SHA512
e36766c2a2472543b5a842936dfa699d5ef2ea2cdd531e617dde159e9b7ff7cff5056e351c547d44fe95555e7d9f75e7b88be9260072c2aba889270360fb3c91
-
SSDEEP
6144:b0hjEofEPGFtb33s/BeS2l1e/B6p3GcxYsqd0wPPqDWESkmJQwIqX0ufO:b6jxfEuF53s/K1eE3Fx8hhG
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exedescription pid process target process PID 1460 set thread context of 1468 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exepid process 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exedescription pid process target process PID 1460 wrote to memory of 1468 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1460 wrote to memory of 1468 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1460 wrote to memory of 1468 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1460 wrote to memory of 1468 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1460 wrote to memory of 1468 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1460 wrote to memory of 1468 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1460 wrote to memory of 1468 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe PID 1460 wrote to memory of 1468 1460 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe 9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe"C:\Users\Admin\AppData\Local\Temp\9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe"C:\Users\Admin\AppData\Local\Temp\9235f3cb1a73b53e265fdb488c05e6ff2c74b7fed21732cfc7da36fd60a75a93.exe"2⤵PID:1468