Analysis
-
max time kernel
325s -
max time network
341s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:34
Static task
static1
Behavioral task
behavioral1
Sample
19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe
Resource
win10v2004-20221111-en
General
-
Target
19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe
-
Size
1.3MB
-
MD5
4f817088c6c01743253caae02d8bc67f
-
SHA1
8a08f9034bf2676ab8b40b3afb6ed0770fb81e28
-
SHA256
19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9
-
SHA512
82c1cd8fbae48dcbc8cb159bd9f0aad73f6c4b8f2e34bcadb0f7a23b94a4490e76227d6d62266e4360b509af603b8818ce3b50671daf49df15a510a3af8275c7
-
SSDEEP
24576:EpyhP5RFFrSEyFPu8JR9ksaQFCLwbLflBPH:LyFPu8D9k5QELuLf
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exedescription pid process target process PID 2468 set thread context of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exepid process 2192 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 2192 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 2192 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 2192 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 2192 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exedescription pid process target process PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe PID 2468 wrote to memory of 2192 2468 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe 19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe"C:\Users\Admin\AppData\Local\Temp\19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\19afc01f3fb8a7ea21b31857702158259c83f8114d0714d942b86ff2593784b9.exe
- Suspicious use of SetWindowsHookEx
PID:2192