Analysis
-
max time kernel
92s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 03:29
Static task
static1
Behavioral task
behavioral1
Sample
2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe
Resource
win10v2004-20220812-en
General
-
Target
2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe
-
Size
124KB
-
MD5
67bfacc799c2ca65a240bda33380638f
-
SHA1
901a17800fa7e5fbead96ffdac353e35870a11ae
-
SHA256
2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c
-
SHA512
35d821603e7cff6ca80d8266890a2f09b00fe024e6ec6c1d563d4af4e6962aaabb13ff32fa50fbca0f3442d7da51bc82732ea5666db5fb72423af0ea7022e15c
-
SSDEEP
3072:pWVQttnaywTOmUeEgwnMjxTHyyz+HcwiYz1:pWVQ5Wz0nMZ+8wiM
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exedescription pid process target process PID 2168 set thread context of 4924 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exepid process 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exedescription pid process target process PID 2168 wrote to memory of 4924 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe PID 2168 wrote to memory of 4924 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe PID 2168 wrote to memory of 4924 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe PID 2168 wrote to memory of 4924 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe PID 2168 wrote to memory of 4924 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe PID 2168 wrote to memory of 4924 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe PID 2168 wrote to memory of 4924 2168 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe 2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe"C:\Users\Admin\AppData\Local\Temp\2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe"C:\Users\Admin\AppData\Local\Temp\2ac88f0e7c5ff57c7f8456e40af324f522abbc431058740d83000446d6e40c1c.exe"2⤵PID:4924