Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 01:34
Static task
static1
Behavioral task
behavioral1
Sample
3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe
Resource
win10v2004-20220901-en
General
-
Target
3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe
-
Size
1.3MB
-
MD5
0b30926862415cb3c47bbfd2b863cf97
-
SHA1
9581c7aec78cb3cbd0e93cd826d667f9b91811a4
-
SHA256
3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec
-
SHA512
8a125bc4d57753e703ee461a239b20b58a0a2295fe6b1f0c7eadb4772e82adf10c06f96cbd0321d7f03185770ca5d8fc14b380ed13b3d7d43426cfd4d849a927
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakq:zrKo4ZwCOnYjVmJPax
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exedescription pid process target process PID 5068 set thread context of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exepid process 3752 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3752 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3752 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3752 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3752 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exedescription pid process target process PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe PID 5068 wrote to memory of 3752 5068 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe 3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe"C:\Users\Admin\AppData\Local\Temp\3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\3c3fc8f206f06bb1b0de84d115bd4eead3a9cecf4bf6c1a93de28e3a24389fec.exe
- Suspicious use of SetWindowsHookEx
PID:3752