Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe
Resource
win7-20220812-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe
-
Size
290KB
-
MD5
21ce11c303f3d2fd59560b76a3e11c5e
-
SHA1
779b830298d5eeeebf33dffc05f7ffd95cf20d31
-
SHA256
a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980
-
SHA512
4b0812fe9229a3ff3362e18332a6edab2edd2b19ffe59d22739accbb7388ab1981856e1f1cd4d7c53cfd65fd19bbe8c08693324da6fd10b57f6c2dc50f26b291
-
SSDEEP
6144:4TpvZOBKtOkfoATA2yxCv07S+C6AqGUkH/E:4lvZOEcl2yxne+4qEE
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4528 set thread context of 4924 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe 82 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4528 wrote to memory of 4924 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe 82 PID 4528 wrote to memory of 4924 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe 82 PID 4528 wrote to memory of 4924 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe 82 PID 4528 wrote to memory of 4924 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe 82 PID 4528 wrote to memory of 4924 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe 82 PID 4528 wrote to memory of 4924 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe 82 PID 4528 wrote to memory of 4924 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe 82 PID 4528 wrote to memory of 4924 4528 a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe"C:\Users\Admin\AppData\Local\Temp\a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe"C:\Users\Admin\AppData\Local\Temp\a288b82212662d739d6cb78dc164d0bbeca5a36b3e6f3fe9507f99ba3b65b980.exe"2⤵PID:4924
-