Analysis
-
max time kernel
182s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe
Resource
win10v2004-20221111-en
General
-
Target
f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe
-
Size
1.3MB
-
MD5
e91def32da26149db8865ce9ee002364
-
SHA1
5e248639ffb0bb7dbcd1e35496f52cccb48789ca
-
SHA256
f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa
-
SHA512
794824b9dbb347d3dbb36ce6d09b5f8fa42b85859d10e846f894f7bb0bd21dcf11a3b6b0a3b8b24c389ada3b02c4ca17cec01830d3b85492848de2572936d99f
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakl:zrKo4ZwCOnYjVmJPae
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4288 set thread context of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 936 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 936 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 936 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 936 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 936 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82 PID 4288 wrote to memory of 936 4288 f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe"C:\Users\Admin\AppData\Local\Temp\f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\f41ec832211ab2aa27b30d3f29e1e04673f5973b4988c67bdf4d0d9462f59baa.exe
- Suspicious use of SetWindowsHookEx
PID:936
-