Analysis
-
max time kernel
178s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 11:58
Static task
static1
Behavioral task
behavioral1
Sample
d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe
Resource
win10v2004-20220812-en
General
-
Target
d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe
-
Size
1.6MB
-
MD5
0e3f049b32cf9dc4bc2806fac999af4e
-
SHA1
1efe8c0afbe56984e4b5c28481fdd17f2b476fe6
-
SHA256
d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6
-
SHA512
cb9109931935bf1ca54f18c5ee8af9680495cf1131f29e56ddfbf5a253541fb2e79539d7388584534e7cd002de6a3c907a0df27a72c83fc7ac93a131885e8fcb
-
SSDEEP
24576:NzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUY6:n6/ye0PIphrp9Zuvjqa0Uidt
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exedescription pid process target process PID 2616 set thread context of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exepid process 4404 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe 4404 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe 4404 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe 4404 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe 4404 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exedescription pid process target process PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe PID 2616 wrote to memory of 4404 2616 d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe"C:\Users\Admin\AppData\Local\Temp\d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe"C:\Users\Admin\AppData\Local\Temp\d3cd17f019223d7b5069fb5966bbf73ba580e5a93cb70eed5f8549bf3e4d37c6.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4404