Analysis
-
max time kernel
34s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe
Resource
win10v2004-20221111-en
General
-
Target
c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe
-
Size
360KB
-
MD5
670559b9bf9b79d163b28c9f91b291c4
-
SHA1
407671748811152bcbbcf009662557af2063b583
-
SHA256
c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539
-
SHA512
0c0cbb193d525eca3b037ba25c501222b075496522a98135d0ad9c5e0591d2e666afe8d8242225daf9136c4f4008ff2754f924f91f6515a9f32bf1ffec2e7b98
-
SSDEEP
3072:Fz/92a98YQ19Se8C/ETyeYYQ19qROLz/9ewqZ6z5ktaiJD8yyN:FL9IR3tcbYRXL98Ez+aKIN
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2024 c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2008 2024 c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe 28 PID 2024 wrote to memory of 2008 2024 c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe 28 PID 2024 wrote to memory of 2008 2024 c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe 28 PID 2024 wrote to memory of 2008 2024 c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe"C:\Users\Admin\AppData\Local\Temp\c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe"C:\Users\Admin\AppData\Local\Temp\c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe" /SETUP2⤵PID:2008
-