Analysis
-
max time kernel
164s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe
Resource
win10v2004-20221111-en
General
-
Target
8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe
-
Size
1.3MB
-
MD5
22251a56b57526af309c4eba4a2c8d98
-
SHA1
eba154c8cdee96a2ba6f6055a90dcc8f3397e412
-
SHA256
8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e
-
SHA512
a47faee1fb6e49af80285e79b3b6d871d45830311a7dc2a74b347b3e70cea2108d766518a4716ad1c1d070d02419c27a5d70a08f63d38f8c6e7668380231889a
-
SSDEEP
24576:4OiZzDXGLFP53UG7bL1HohIE6BvRx0GOb/4+a0q3bhAqtxe9Q:Ri1DWLFP53UGe76x0ZUphdtb
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4176 set thread context of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4092 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 4092 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 4092 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 4092 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 4092 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81 PID 4176 wrote to memory of 4092 4176 8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe"C:\Users\Admin\AppData\Local\Temp\8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\8d67a2b2edec99d33d384b983e35921adf3f222727edbf38c42b4ff6b00c597e.exe
- Suspicious use of SetWindowsHookEx
PID:4092
-