Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe
Resource
win10v2004-20220812-en
General
-
Target
7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe
-
Size
205KB
-
MD5
743c31e06656e551ae80ceeaf2120aa5
-
SHA1
775b0e8da4e4bf7f55b0656c76c4cb72428e099b
-
SHA256
7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c
-
SHA512
494a244856031ac3545b92a35e4c594055ff35719cc0b2214199ee20bb99ebacd54769524b2a8b47a51b0cd24d3df8cf3f7d7d329398c5082844a84cf9a44ca8
-
SSDEEP
3072:sB406yohsa6XLnxQ5h480DqBRhVh8njm9VCEGKH+YOMp7Ld7Gkcm/:sYb9SC2DqBRhVh8njm9VCwH+ep7Ld7Gu
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4984 set thread context of 4880 4984 7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe 80 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4984 7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4880 4984 7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe 80 PID 4984 wrote to memory of 4880 4984 7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe 80 PID 4984 wrote to memory of 4880 4984 7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe 80 PID 4984 wrote to memory of 4880 4984 7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe 80 PID 4984 wrote to memory of 4880 4984 7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe 80 PID 4984 wrote to memory of 4880 4984 7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe 80 PID 4984 wrote to memory of 4880 4984 7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe"C:\Users\Admin\AppData\Local\Temp\7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exeC:\Users\Admin\AppData\Local\Temp\7b24c7d3a5e823a81f051a3e19134e3608f32c67ef3369c9ed3ae27cb5e48a2c.exe2⤵PID:4880
-