Analysis
-
max time kernel
135s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 12:48
Static task
static1
Behavioral task
behavioral1
Sample
4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe
Resource
win10v2004-20220812-en
General
-
Target
4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe
-
Size
422KB
-
MD5
1b51bf0ca49825d1e1286abd1f8b1050
-
SHA1
26ff88465963469ae2cf5a3cb034589f064c9610
-
SHA256
4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173
-
SHA512
0ab6b7730384371500da91f6e5943982e5f2e517918fd3912c0b9c5d38226a6460c18df34f38b3a88582f05f2230b4dd2b0f012f9b65989816c0336c846c0272
-
SSDEEP
3072:WuPJGLv21HL2bw/ZBeFZyea4aOQ0i2ogl8y7hqhMR2szjMO+DnITi6s+A5HjbQDg:lYbRoT3lsjS3pzPz8lxO
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1060 set thread context of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82 PID 1060 wrote to memory of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82 PID 1060 wrote to memory of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82 PID 1060 wrote to memory of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82 PID 1060 wrote to memory of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82 PID 1060 wrote to memory of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82 PID 1060 wrote to memory of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82 PID 1060 wrote to memory of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82 PID 1060 wrote to memory of 2124 1060 4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe"C:\Users\Admin\AppData\Local\Temp\4232ea6f98f4655d54f6642521ba018c2697396a321f27a5e14e9baa0998c173.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\Notepad.exeNotepad.exe2⤵PID:2124
-