Analysis
-
max time kernel
94s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe
Resource
win10v2004-20221111-en
General
-
Target
1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe
-
Size
156KB
-
MD5
0db22fcb6a7614b2f14e713ffd1183c0
-
SHA1
388cb1e19db9995337354abe16755f42197dd9eb
-
SHA256
1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5
-
SHA512
d757d2185572cc31d4e01a5eef2dd566afce71a818f8a44a695fd5450a37587c36ab4baa18745fffe9a24254a97fad9c50d1b460bfb09dbd86e653a6d51c8ef7
-
SSDEEP
1536:KYvyId58cuffD6jQXIe5wnfXD9VPSDt/+LhfySZw9LllkF+3ShjFUQTHt+EZswDa:KEVqjffnXpoQtghfygSllESQjjTd/BkH
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\calcs.exe 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 980 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1900 wrote to memory of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28 PID 1900 wrote to memory of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28 PID 1900 wrote to memory of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28 PID 1900 wrote to memory of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28 PID 1900 wrote to memory of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28 PID 1900 wrote to memory of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28 PID 1900 wrote to memory of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28 PID 1900 wrote to memory of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28 PID 1900 wrote to memory of 980 1900 1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe"C:\Users\Admin\AppData\Local\Temp\1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exeC:\Users\Admin\AppData\Local\Temp\1f6f5459407d10798a4bc8478dd1186bea078ede412f84ca37af719d3f6263b5.exe2⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:980
-