Analysis
-
max time kernel
100s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 10:43
Static task
static1
Behavioral task
behavioral1
Sample
e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe
Resource
win10v2004-20220812-en
General
-
Target
e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe
-
Size
1.3MB
-
MD5
6f9b5addbcd939b999a3671581645e8b
-
SHA1
edd37bf8df8a6a2758ee06fbc22b7150f43c59fb
-
SHA256
e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57
-
SHA512
f394bea382ba58c45847ca78a625fd96116f0794b7ca13c56fc96de8a666bf3dab181717590253d0d018c1e39341d6f4046655555ee3fa2836307ebd6c168172
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak7:zrKo4ZwCOnYjVmJPaY
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1484 set thread context of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4840 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 4840 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 4840 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 4840 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 4840 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80 PID 1484 wrote to memory of 4840 1484 e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe"C:\Users\Admin\AppData\Local\Temp\e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\e1b6a56b17a8d97de1c7d9c0a0cabcfea000fa7d7a4ba5afd53234ba553fac57.exe
- Suspicious use of SetWindowsHookEx
PID:4840
-