Analysis
-
max time kernel
243s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe
Resource
win10v2004-20221111-en
General
-
Target
a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe
-
Size
184KB
-
MD5
acf0e3f195c3f34e517fc89ed263deff
-
SHA1
f496ad2fdb2419f8cfe477452185f9d92c515bf8
-
SHA256
a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2
-
SHA512
6e6bc84aeab5a030dc6fff8a5caff0468347ebca796a444b02aed546f5e4235c099ef377e3a4d38accacf2df56c86f7a032de048fd420579f4526044c13c7f23
-
SSDEEP
3072:zq3opFGwZ+MFEMnTRNG0ihixnZsTjrn+CDEE6YGuDKtVydkWrGB7yWODNAXHxpE7:7GwD/rpg+CsYGuDKt3YGIheHxXIQy
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 912 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 912 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 912 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1632 wrote to memory of 912 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 28 PID 1632 wrote to memory of 912 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 28 PID 1632 wrote to memory of 912 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 28 PID 1632 wrote to memory of 912 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 28 PID 1632 wrote to memory of 912 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 28 PID 1632 wrote to memory of 912 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 28 PID 1632 wrote to memory of 912 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 28 PID 1632 wrote to memory of 912 1632 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 28 PID 912 wrote to memory of 1232 912 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 18 PID 912 wrote to memory of 1232 912 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 18 PID 912 wrote to memory of 1232 912 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 18 PID 912 wrote to memory of 1232 912 a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe"C:\Users\Admin\AppData\Local\Temp\a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe"C:\Users\Admin\AppData\Local\Temp\a0dd8c5bb3658eb7e2db59579a2326b4fa0c7d6cfccc04ef817f5d65622327d2.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:912
-
-