Analysis
-
max time kernel
197s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe
Resource
win10v2004-20221111-en
General
-
Target
acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe
-
Size
1.4MB
-
MD5
657dfda552c7a2d085c78ec3f521b25b
-
SHA1
498dc78cddc6565e2d7417ee9dde23d1eb34bdc1
-
SHA256
acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece
-
SHA512
c3428ef89197d3e0daecbd7c4de2d1fe7b93a7ad1cd27ed33b2622f5d0a979cecf44903509f04100c1914619128e58b26a528fac3a4d38ece72ef009b79af2cc
-
SSDEEP
24576:hrK6dClXmekxlm1dl4r260n4dz0as5jc3AZ1COwiUP/5lq8A2:hrBew72604doSw6ewt
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1820 set thread context of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1472 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 1472 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 1472 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 1472 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 1472 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83 PID 1820 wrote to memory of 1472 1820 acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe"C:\Users\Admin\AppData\Local\Temp\acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\acb093a890249cea9e9a1d2de24d693c6bea1de887524c4ba4966497f3ee2ece.exe
- Suspicious use of SetWindowsHookEx
PID:1472
-