Analysis
-
max time kernel
155s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:56
Static task
static1
Behavioral task
behavioral1
Sample
ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe
Resource
win10v2004-20220812-en
General
-
Target
ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe
-
Size
1.6MB
-
MD5
0495eae0d195147866c6db6aa7a4df99
-
SHA1
cce5ce521357674604164b202754b9407b4f03a8
-
SHA256
ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32
-
SHA512
1bbef7acca0852623d00966223bf9234fe1f74dbe31fc9feecc0c76225eb7f5f218eb009d7cd5f5c058907bd71fd88ca96178e7e7557a4c2761c9e6d19364129
-
SSDEEP
24576:NzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYG:n6/ye0PIphrp9Zuvjqa0Uidl
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exedescription pid process target process PID 444 set thread context of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exepid process 1960 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe 1960 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe 1960 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe 1960 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe 1960 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exedescription pid process target process PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe PID 444 wrote to memory of 1960 444 ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe"C:\Users\Admin\AppData\Local\Temp\ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe"C:\Users\Admin\AppData\Local\Temp\ffad50eea9658e94efb770f513fad512b75e5bee865019db79f1dea1a8fc7f32.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1960