Analysis
-
max time kernel
367s -
max time network
380s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe
Resource
win10v2004-20221111-en
General
-
Target
d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe
-
Size
172KB
-
MD5
52978cf104c7cb61fc751ec4ef5068d9
-
SHA1
86aaae707957a4d04e5f06652e69a6dd88ecb0eb
-
SHA256
d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09
-
SHA512
32010fc3bf8a3e0d5a26dc54dcfd50c368f7033b5a7dafca37e6833a85772db9f5e72c04f3e26f98c4a5c38a652485240e71f74d0bd405a2dc497d0f1849dcec
-
SSDEEP
3072:mw3wG3gDD5XbgdK2B9wYUTfFglwo6kEJQplPf8h7pcWy9B9L8cmod7Z6hdXB6uQ2:dkDDSdK2BxiqlrU+Eh7ipmo1idXB6x2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3728 set thread context of 1376 3728 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 79 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1376 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 1376 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 1376 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 1376 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3728 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3728 wrote to memory of 1376 3728 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 79 PID 3728 wrote to memory of 1376 3728 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 79 PID 3728 wrote to memory of 1376 3728 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 79 PID 3728 wrote to memory of 1376 3728 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 79 PID 3728 wrote to memory of 1376 3728 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 79 PID 3728 wrote to memory of 1376 3728 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 79 PID 3728 wrote to memory of 1376 3728 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 79 PID 1376 wrote to memory of 2468 1376 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 58 PID 1376 wrote to memory of 2468 1376 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 58 PID 1376 wrote to memory of 2468 1376 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 58 PID 1376 wrote to memory of 2468 1376 d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe"C:\Users\Admin\AppData\Local\Temp\d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exeC:\Users\Admin\AppData\Local\Temp\d0f4d2363c4929acb922fd32396853c9e03bfcef6ea2b6939363c4675179af09.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376
-
-