Analysis
-
max time kernel
201s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe
Resource
win10v2004-20221111-en
General
-
Target
f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe
-
Size
1.3MB
-
MD5
7edaf4c5a29fdaa95f04bf43b6ba82ce
-
SHA1
e5adba3b2060be9c5c0acd9c2c05d0e139e3d041
-
SHA256
f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2
-
SHA512
7f0ebb211f5195a9815f0666d7d8582ea854bae413ed23d776fe0e56f7155b7034664ec30b28d684dd5227c166eae16d55c9c52456aae9392d6e629016c017d9
-
SSDEEP
24576:WKyKz4D4ufmwhzA2QoPKCys7JdpmnMlxy9KR8uQcun:WKVzMNuwIKyoBmnMSURNQH
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4160 set thread context of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2468 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 2468 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 2468 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 2468 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 2468 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81 PID 4160 wrote to memory of 2468 4160 f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe"C:\Users\Admin\AppData\Local\Temp\f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\f9671c26e45961c723a51a5875617116650c2a82914e732f354fbcf17a3208f2.exe
- Suspicious use of SetWindowsHookEx
PID:2468
-