Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 16:42
Static task
static1
Behavioral task
behavioral1
Sample
9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe
Resource
win10v2004-20220812-en
General
-
Target
9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe
-
Size
1.5MB
-
MD5
3db12f8a1ddbc278fd9787e57b5089c0
-
SHA1
bd8fec42fa35884b224eef68cde46212ecf335c0
-
SHA256
9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be
-
SHA512
a6f8631708f08a1c74252790df8edb25e4690e3acb7f5a65169309049733d71d295991fb58a807735a7fc61fc708d425910d08777f21f486e79196c175231344
-
SSDEEP
24576:VzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYj:v6/ye0PIphrp9Zuvjqa0Uid0
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exedescription pid process target process PID 4532 set thread context of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exepid process 1388 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 1388 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 1388 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 1388 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 1388 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exedescription pid process target process PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe PID 4532 wrote to memory of 1388 4532 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe 9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe"C:\Users\Admin\AppData\Local\Temp\9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe"C:\Users\Admin\AppData\Local\Temp\9d540e292c689fde72a32df7e77ec0b023afd03c5b14bf3552a3e88e0ec650be.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1388