Analysis
-
max time kernel
175s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe
Resource
win10v2004-20220812-en
General
-
Target
c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe
-
Size
1.6MB
-
MD5
f09d7f487f5893f682b825d4bbbe013d
-
SHA1
0caa2a18502889d3815ca4c1128cbc14eb1aae3f
-
SHA256
c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672
-
SHA512
3ba01321ce7dadabc9591819f808e9a8f98ed71715cb9a207c824f88301b579cc80a94e90994976677df844649e400d7ee1e4a5906cb56578f3b56609d5f1d68
-
SSDEEP
24576:xzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYS:D6/ye0PIphrp9Zuvjqa0Uidl
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4944 set thread context of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4912 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81 PID 4944 wrote to memory of 4912 4944 c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe"C:\Users\Admin\AppData\Local\Temp\c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe"C:\Users\Admin\AppData\Local\Temp\c7d94821de0a128d6c98b8de2d613812002189bdd9c9585be27136b9ffb52672.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4912
-