Analysis
-
max time kernel
42s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe
Resource
win10v2004-20220812-en
General
-
Target
caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe
-
Size
144KB
-
MD5
616fc3b3162abe5a830bf50e1b670950
-
SHA1
9c73ee3ae59af9af261f6b0c4afcbf2ebc68b626
-
SHA256
caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b
-
SHA512
506e5abee4b4f86da977759092fcbcdee88731b2b354ab4fe1ac66d076dfdb107028bd90bd14493bc558599246cad897cfceb397bc248d06f116cbb718dd4e5c
-
SSDEEP
1536:bZRxvR+YjwBCTw9fFU8hYq4R79ZvKjSh6Yx563YLfmYJXO1tnraMsq25Q5Pu5FsI:jPEFdF4V9ZvK2kYx58emYtEt+V/5CemI
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1096 set thread context of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80 PID 1096 wrote to memory of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80 PID 1096 wrote to memory of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80 PID 1096 wrote to memory of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80 PID 1096 wrote to memory of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80 PID 1096 wrote to memory of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80 PID 1096 wrote to memory of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80 PID 1096 wrote to memory of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80 PID 1096 wrote to memory of 1492 1096 caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe"C:\Users\Admin\AppData\Local\Temp\caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b.exe742⤵PID:1492
-
C:\Users\Admin\jeoow.exe"C:\Users\Admin\jeoow.exe"3⤵PID:3528
-
C:\Users\Admin\jeoow.exe744⤵PID:4852
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5616fc3b3162abe5a830bf50e1b670950
SHA19c73ee3ae59af9af261f6b0c4afcbf2ebc68b626
SHA256caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b
SHA512506e5abee4b4f86da977759092fcbcdee88731b2b354ab4fe1ac66d076dfdb107028bd90bd14493bc558599246cad897cfceb397bc248d06f116cbb718dd4e5c
-
Filesize
144KB
MD5616fc3b3162abe5a830bf50e1b670950
SHA19c73ee3ae59af9af261f6b0c4afcbf2ebc68b626
SHA256caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b
SHA512506e5abee4b4f86da977759092fcbcdee88731b2b354ab4fe1ac66d076dfdb107028bd90bd14493bc558599246cad897cfceb397bc248d06f116cbb718dd4e5c
-
Filesize
144KB
MD5616fc3b3162abe5a830bf50e1b670950
SHA19c73ee3ae59af9af261f6b0c4afcbf2ebc68b626
SHA256caf58cf11b52987cdc634199dea4da0ff2732fc779266c7661181309ea13b79b
SHA512506e5abee4b4f86da977759092fcbcdee88731b2b354ab4fe1ac66d076dfdb107028bd90bd14493bc558599246cad897cfceb397bc248d06f116cbb718dd4e5c