Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 19:13
Static task
static1
Behavioral task
behavioral1
Sample
ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe
Resource
win10v2004-20220812-en
General
-
Target
ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe
-
Size
160KB
-
MD5
0d315bfa623bed0bb753c50706e73726
-
SHA1
39ac7410cd2f1896bdd65f5dd94e63ca37dd8cba
-
SHA256
ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33
-
SHA512
72e8754764fc05c729f0bbcea2b24299e2ee1a283accbd2f474d80129def94953c1cf3cbe96b8727a73853cbb4dd36279838e76890f73a9a9a64913bff8c87e5
-
SSDEEP
1536:j2OeyIbByNqAh5P+g0s5CXf9HpHpMbKgyAptwM9VyTwEUg4rBgWNz:e1ByV5P+g0s5CXBq5frEU/V
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1544 set thread context of 1216 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 26 PID 1216 set thread context of 280 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 27 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1216 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 26 PID 1544 wrote to memory of 1216 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 26 PID 1544 wrote to memory of 1216 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 26 PID 1544 wrote to memory of 1216 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 26 PID 1544 wrote to memory of 1216 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 26 PID 1544 wrote to memory of 1216 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 26 PID 1544 wrote to memory of 1216 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 26 PID 1544 wrote to memory of 1216 1544 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 26 PID 1216 wrote to memory of 280 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 27 PID 1216 wrote to memory of 280 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 27 PID 1216 wrote to memory of 280 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 27 PID 1216 wrote to memory of 280 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 27 PID 1216 wrote to memory of 280 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 27 PID 1216 wrote to memory of 280 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 27 PID 1216 wrote to memory of 280 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 27 PID 1216 wrote to memory of 280 1216 ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe"C:\Users\Admin\AppData\Local\Temp\ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exeC:\Users\Admin\AppData\Local\Temp\ed755db79db8dac7e5215f39c87f9e815d4fa6004a9af30654f88b084b53cf33.exe3⤵PID:280
-
-