Analysis
-
max time kernel
196s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe
Resource
win10v2004-20220812-en
General
-
Target
ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe
-
Size
1.3MB
-
MD5
4137c498b64360a6312bcd87b805d365
-
SHA1
1f06df53fd91df1636ac934362d5fe9eb84444fe
-
SHA256
ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba
-
SHA512
b34e7e8df626ecde8f6d9d6925f7c7a5a6007985095e7262372607d59b769478b143198a317002532eb3a68f36643e69e34e006b1d697749420beb8700ec48cf
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakr:jrKo4ZwCOnYjVmJPag
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4700 set thread context of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4532 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 4532 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 4532 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 4532 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 4532 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78 PID 4700 wrote to memory of 4532 4700 ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe"C:\Users\Admin\AppData\Local\Temp\ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\ed6d2c57127a4d5a932cc4cc5c870a10d2cad38c94ada9cb82ff53a9183252ba.exe
- Suspicious use of SetWindowsHookEx
PID:4532
-