Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:09
Static task
static1
Behavioral task
behavioral1
Sample
d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe
Resource
win10v2004-20220812-en
General
-
Target
d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe
-
Size
1.3MB
-
MD5
ca8cb3d2bd67a71db6ce71ab169df775
-
SHA1
a48554ced00a655d513ba47a39a1c52ef90f807b
-
SHA256
d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899
-
SHA512
746195f8279f118ab2b342fa3d8a2bda3d6d4aef8900da1065736fc72c94d0b5561217ef4de04c2ed362a4887f3bc6747a6c126c3ed7d858a8a6e43f751e7eeb
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakw:zrKo4ZwCOnYjVmJPaX
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exedescription pid process target process PID 4308 set thread context of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exepid process 396 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe 396 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe 396 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe 396 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe 396 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exedescription pid process target process PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe PID 4308 wrote to memory of 396 4308 d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe"C:\Users\Admin\AppData\Local\Temp\d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\d1bc1186e3e59e9d566b6de2783f1f8a64c9b9334719480e9ad5edf4a0f2c899.exe
- Suspicious use of SetWindowsHookEx
PID:396