Analysis
-
max time kernel
179s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 08:23
Static task
static1
Behavioral task
behavioral1
Sample
fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe
Resource
win10v2004-20220812-en
General
-
Target
fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe
-
Size
1.3MB
-
MD5
b5818b4164b7c2ac903842150fb4c4c4
-
SHA1
9dd789f46d950dda500f432ca4c48e95d8f4bc63
-
SHA256
fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486
-
SHA512
79a3f29d3a18e32e62407c472935e557da34986edc36dade5c171870b538f645908f3b28f53c776e3a5f60603ed7cc781072d62b2859f65b5cbe3a34f552f5e0
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:jrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exedescription pid process target process PID 1388 set thread context of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exepid process 2496 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe 2496 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe 2496 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe 2496 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe 2496 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exedescription pid process target process PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe PID 1388 wrote to memory of 2496 1388 fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe"C:\Users\Admin\AppData\Local\Temp\fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\fab7ba74fe36d6157c4f1d36789cef82114d9bd310eacb26dd250a8ad8ba6486.exe
- Suspicious use of SetWindowsHookEx
PID:2496
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2496-132-0x0000000000000000-mapping.dmp
-
memory/2496-133-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/2496-134-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/2496-135-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/2496-136-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/2496-137-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB