Analysis
-
max time kernel
148s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 19:49
Static task
static1
Behavioral task
behavioral1
Sample
7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe
Resource
win10v2004-20220812-en
General
-
Target
7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe
-
Size
1.6MB
-
MD5
265358847c4fb353e1c9a8c1ac77b86d
-
SHA1
7f2f556ab330c913c758834c6cbc1cd460c4b013
-
SHA256
7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d
-
SHA512
59529714666cf1cf651e827467e0ea5243411f6b8a8f83ea805155ccb79f3f9d9ea0f0b12271d5db64ce32b4e1ef01b5251be7d64cd30bbaf880df7ad19d2028
-
SSDEEP
24576:NzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUY:n6/ye0PIphrp9Zuvjqa0Uid
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exedescription pid process target process PID 1016 set thread context of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exepid process 2040 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 2040 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 2040 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 2040 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 2040 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exedescription pid process target process PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe PID 1016 wrote to memory of 2040 1016 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe 7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe"C:\Users\Admin\AppData\Local\Temp\7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe"C:\Users\Admin\AppData\Local\Temp\7c4c854b61191977c20a7bf49c915aad0f3c6a40e56a56f7b6d755d57e50f53d.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2040
-