Analysis
-
max time kernel
291s -
max time network
341s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe
Resource
win10v2004-20221111-en
General
-
Target
7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe
-
Size
1.5MB
-
MD5
9bf311c9a6b5312e37963bcae5b5e561
-
SHA1
b2f4f3df234b11509f926fbf67a4097bb9973ae6
-
SHA256
7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0
-
SHA512
06a9c9428443280a14f98d8166a6daca97030211ec185649dfcfa34e5eed530525f540e69087a81c65cc6d739bf3eb163f8208713182436b1e125ece779fcf14
-
SSDEEP
24576:rPEzeDWtazKrcVWv+FjisSOZYjmOdXQ+ARZoQWnQUwMlds0VwI/9MO:rIwwImsMqQA57oQWcGdsy7
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 732 set thread context of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4996 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 4996 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 4996 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 4996 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 4996 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83 PID 732 wrote to memory of 4996 732 7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe"C:\Users\Admin\AppData\Local\Temp\7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\7dc0cb29adf329077d3657651e743301b567bb08835617f045ff24e125a8b7d0.exe
- Suspicious use of SetWindowsHookEx
PID:4996
-