Analysis
-
max time kernel
141s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:04
Static task
static1
Behavioral task
behavioral1
Sample
d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe
Resource
win10v2004-20221111-en
General
-
Target
d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe
-
Size
1.6MB
-
MD5
9cabac07f50b6f28c574e3b099f1e178
-
SHA1
06098a3441a12bed73f433cc9572a26ae51b8cc0
-
SHA256
d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095
-
SHA512
eb12e60558b80932fac9da25d9fc3dd6396ad70e4dd78a901d42293c2be423e506de35477ed159dd9a9e15d8fa8f97a07c1fa7c35f97e2d06bd021fb2ab1e958
-
SSDEEP
24576:tzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYp:H6/ye0PIphrp9Zuvjqa0Uidu
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exedescription pid process target process PID 1224 set thread context of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exepid process 3604 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe 3604 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe 3604 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe 3604 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe 3604 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exedescription pid process target process PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe PID 1224 wrote to memory of 3604 1224 d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe"C:\Users\Admin\AppData\Local\Temp\d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe"C:\Users\Admin\AppData\Local\Temp\d2a8a0abe8cb89947e704d229b5d6c7d6c64511abb833e4235adc5006a4e7095.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3604