Analysis
-
max time kernel
262s -
max time network
319s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 08:11
Static task
static1
Behavioral task
behavioral1
Sample
fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe
Resource
win10v2004-20221111-en
General
-
Target
fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe
-
Size
1.3MB
-
MD5
420ca40dccca461a804e17e14e314899
-
SHA1
c8cc4641b089129b6a747a1d6ec2c53cfab198a1
-
SHA256
fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78
-
SHA512
950be422bca385721258585af010f4bd6248bdf606afbdf226549db6c742b8d88012ca9c421c8d7a7cc07c8c0203218e7aaaeb3a5802000707382c2cdb40aa97
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakj:TrKo4ZwCOnYjVmJPas
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exedescription pid process target process PID 4968 set thread context of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exepid process 5060 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe 5060 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe 5060 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe 5060 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe 5060 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exedescription pid process target process PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe PID 4968 wrote to memory of 5060 4968 fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe"C:\Users\Admin\AppData\Local\Temp\fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\fcd86663074dca60f0bfe27873af5dfb82a1d737340b07f5cb0d8bd38078cd78.exe
- Suspicious use of SetWindowsHookEx
PID:5060