Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe
Resource
win10v2004-20220812-en
General
-
Target
cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe
-
Size
280KB
-
MD5
577208c5add735b1ec2a2f60fecd2364
-
SHA1
587c37d1beff34d36930c3e3a94c8aafd06732a6
-
SHA256
cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac
-
SHA512
58d70e3a2e1e9798a08ed2901aa424729697652c68be47bbaa9191f67f3690bd55848da5082b6fdc3834fffec25bc487fbffd1c7c7bc16ab5691cfd9253cb25a
-
SSDEEP
6144:VBZPbEkTLCBTvUgldtu34dKXqKjIdoCXdaONE5FhdPrt:VBZbEkTLCBTvUgldtu34dKXqZ5XdaaEV
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1220 set thread context of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 PID 1220 wrote to memory of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 PID 1220 wrote to memory of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 PID 1220 wrote to memory of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 PID 1220 wrote to memory of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 PID 1220 wrote to memory of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 PID 1220 wrote to memory of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 PID 1220 wrote to memory of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 PID 1220 wrote to memory of 2404 1220 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 80 PID 2404 wrote to memory of 376 2404 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 54 PID 2404 wrote to memory of 376 2404 cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe"C:\Users\Admin\AppData\Local\Temp\cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe"C:\Users\Admin\AppData\Local\Temp\cd7c1c6eeb87281f806b46edfd69ece4abbab0591e6850ca4162e1b6196c35ac.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2404
-
-