Analysis
-
max time kernel
265s -
max time network
322s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe
Resource
win10v2004-20221111-en
General
-
Target
9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe
-
Size
116KB
-
MD5
e46533b40da1d470aea6b0f2639cc1fb
-
SHA1
1bc2240881008a19fdfd7430fd3afc5481caa04a
-
SHA256
9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a
-
SHA512
739d82090fc840b8437a2a14b8dd94aadd2881a3734c9a74526fb1d8dd1314d994d97bf083edebc783cbe81f0210e27ee8ac526e47fb895b5f6502562e2807ef
-
SSDEEP
3072:u7Ns4ln2Ceja1RD4XP999W9l9o999zB999999899fE6e6VE6B999W9l9o999zB9T:ANdlbIP999W9l9o999zB999999899M6D
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80 PID 4548 wrote to memory of 2236 4548 9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe"C:\Users\Admin\AppData\Local\Temp\9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe"C:\Users\Admin\AppData\Local\Temp\9dc62596ec0ef91388425b4f9053eaad3ffa405519969b15ecb426babec7779a.exe"2⤵PID:2236
-