Analysis
-
max time kernel
150s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 10:47
Static task
static1
Behavioral task
behavioral1
Sample
e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe
Resource
win10v2004-20221111-en
General
-
Target
e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe
-
Size
1.5MB
-
MD5
bb8c13fff8a5ba26938f8503e30e4b43
-
SHA1
f59cff98a0742f8590a9c1e58b2db70f42f30451
-
SHA256
e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3
-
SHA512
0c8f7490074d935fdfbafe7ce58a16afd7bc99a87f69d2074c60d566c662ab4cfc12b5e2eb94298e5c4b8f8ba04d4179ccb135422ecf0335834f5a5c3123c1b8
-
SSDEEP
24576:1zD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYY:P6/ye0PIphrp9Zuvjqa0Uid/
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4260 set thread context of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2264 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 2264 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 2264 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 2264 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 2264 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84 PID 4260 wrote to memory of 2264 4260 e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe"C:\Users\Admin\AppData\Local\Temp\e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe"C:\Users\Admin\AppData\Local\Temp\e0e2658709cd8d6744f432c383dc68e61d1366fae2b8b8939d303ab5a6f24fd3.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2264
-