Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 03:07
Static task
static1
Behavioral task
behavioral1
Sample
75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe
Resource
win10v2004-20220901-en
General
-
Target
75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe
-
Size
333KB
-
MD5
8ab81c09d50cc8fa7ad00c23e88d128b
-
SHA1
eb3af02a8df7ff43a5f22f74638b06565467fb1c
-
SHA256
75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac
-
SHA512
6da260681974a40daa9ddb504db76d9e45683fa0b76fd37253aba45631e0448bace94154bf87d22e256e9ff9c006731ef1a20f50b0100d18b44098430b422989
-
SSDEEP
6144:Gakbk7cFfaNqqIvJXLe410Wb3/rqvahRtgzdunXgfCz9bwBWmPEOTlX9nvbwXq5U:7ko0xjlmAtodunXSY9bwRP9X9n0IU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4396 set thread context of 4860 4396 75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe 80 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4860 4396 75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe 80 PID 4396 wrote to memory of 4860 4396 75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe 80 PID 4396 wrote to memory of 4860 4396 75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe 80 PID 4396 wrote to memory of 4860 4396 75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe 80 PID 4396 wrote to memory of 4860 4396 75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe 80 PID 4396 wrote to memory of 4860 4396 75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe 80 PID 4396 wrote to memory of 4860 4396 75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe 80 PID 4396 wrote to memory of 4860 4396 75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe"C:\Users\Admin\AppData\Local\Temp\75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe"C:\Users\Admin\AppData\Local\Temp\75827179466c3f8143d0cecec8d5f7f72b48bdb45bf2f1de686dc76d49db0dac.exe"2⤵PID:4860
-