Analysis
-
max time kernel
178s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe
Resource
win10v2004-20221111-en
General
-
Target
b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe
-
Size
260KB
-
MD5
9cc5744615f33204928dda0382071f55
-
SHA1
69f01e5931dc9c15e3b3077e8ad08d647db149a2
-
SHA256
b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38
-
SHA512
b685ee5703d83cca845cbcaf0c460aac6639868789a87d075e27dc693b1ba9c33f05918ed006e0c85473bb1ca77438f7d122695f3c70ab663f440331a2ef3207
-
SSDEEP
3072:Fmr+JtohYkQr0jeLwJr95lJoyc6V1kypdx/UohYkQr0jxLwJr95rJozLQ4f9:FWnYQqLwhHlWyRDxRYQ9LwhHrW44l
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 768 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 84 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 768 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2752 wrote to memory of 768 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 84 PID 2752 wrote to memory of 768 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 84 PID 2752 wrote to memory of 768 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 84 PID 2752 wrote to memory of 768 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 84 PID 2752 wrote to memory of 768 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 84 PID 2752 wrote to memory of 768 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 84 PID 2752 wrote to memory of 768 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 84 PID 2752 wrote to memory of 768 2752 b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe"C:\Users\Admin\AppData\Local\Temp\b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exeC:\Users\Admin\AppData\Local\Temp\b3acf4ef74758b536e0a9f5738d1714a51a15f288c889420a872b2e7fc12ba38.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:768
-