Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 12:43
Static task
static1
Behavioral task
behavioral1
Sample
5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe
Resource
win10v2004-20220901-en
General
-
Target
5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe
-
Size
925KB
-
MD5
37fa1769fbd0996d400b2a14b898b88b
-
SHA1
9b93c9fb4f224bf7399f6906c6cecf7f9a5246c3
-
SHA256
5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c
-
SHA512
74095afa82e7a6169f7acb09cb9981e9893eca5e0c1a5e9e2d0371584a7dcf5cabe3dd1b7bc4d782a9a2a52d561cf8c3144ae51b782bff3c3e6e4dc23d5e5606
-
SSDEEP
12288:gmf8PzkvaBHmLV8P22zx+kdJ00Bvuyymhcx1UG6HyNrSjqOuPn6mc2RREYJaR:7Skv/VCWkdJ0OpGmyNtjPn68REYs
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4760-133-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/4760-135-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/4760-136-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/4760-137-0x0000000000400000-0x00000000004E9000-memory.dmp upx behavioral2/memory/4760-138-0x0000000000400000-0x00000000004E9000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3488 set thread context of 4760 3488 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 81 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4760 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 4760 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 4760 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 4760 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 4760 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3488 wrote to memory of 4760 3488 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 81 PID 3488 wrote to memory of 4760 3488 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 81 PID 3488 wrote to memory of 4760 3488 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 81 PID 3488 wrote to memory of 4760 3488 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 81 PID 3488 wrote to memory of 4760 3488 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 81 PID 3488 wrote to memory of 4760 3488 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 81 PID 3488 wrote to memory of 4760 3488 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 81 PID 3488 wrote to memory of 4760 3488 5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe"C:\Users\Admin\AppData\Local\Temp\5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe"C:\Users\Admin\AppData\Local\Temp\5e38d749268261e5c41a9a225ff0e6c68279a7d2cf47e6c05c0f406c0ddf230c.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4760
-