Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 15:02
Static task
static1
Behavioral task
behavioral1
Sample
3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe
Resource
win10v2004-20220812-en
General
-
Target
3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe
-
Size
1.3MB
-
MD5
073ea1a36614a04e4b83df38370cd7e2
-
SHA1
c04808f924736a193b0129cbe4358b2882edb12a
-
SHA256
3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964
-
SHA512
d1f4a3b650a7959722e6b2206dccb49c7eb63cf69edcc9bf642e4c9af554eb0c8482e689016ce3684c2dadd61aeb90ed324be850b4020ca8f5b7888533adcb9f
-
SSDEEP
24576:4OiZzDXGLFP53UG7bL1HohIE6BvRx0GOb/4+a0q3bhAqtxe9:Ri1DWLFP53UGe76x0ZUphdt
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4684 set thread context of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3260 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 3260 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 3260 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 3260 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 3260 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79 PID 4684 wrote to memory of 3260 4684 3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe"C:\Users\Admin\AppData\Local\Temp\3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\3d047fd84d82d40af9325b19372ad9e2ad21b5ef7ad80ae30439f0de10403964.exe
- Suspicious use of SetWindowsHookEx
PID:3260
-