Analysis
-
max time kernel
62s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:57
Static task
static1
Behavioral task
behavioral1
Sample
ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe
Resource
win10v2004-20220812-en
General
-
Target
ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe
-
Size
1.3MB
-
MD5
db2d15a3d8c773f7a54c0445ef3f76cb
-
SHA1
d2dd1b33eb6a248d822693f5fb8a399f547c2481
-
SHA256
ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e
-
SHA512
8af0fea79baef3eff853ca75439d2fc7ac6ae8aec47b42f660de9d14f220490f4fa449f46729b9c544ce105ca6f93dc0116780e3f9aad6a163fa5a48ce5f747c
-
SSDEEP
24576:KrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakh:KrKo4ZwCOnYjVmJPaW
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exedescription pid process target process PID 4572 set thread context of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exepid process 1624 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe 1624 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe 1624 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe 1624 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe 1624 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exedescription pid process target process PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe PID 4572 wrote to memory of 1624 4572 ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe"C:\Users\Admin\AppData\Local\Temp\ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\ff835348865c265f67133890a9f0fa69113d85e584b96e2ad2a66d341e89a52e.exe
- Suspicious use of SetWindowsHookEx
PID:1624