Analysis
-
max time kernel
149s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe
Resource
win10v2004-20220812-en
General
-
Target
64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe
-
Size
574KB
-
MD5
66d32d9f66a2311dd381c7c3b0e5e892
-
SHA1
75db8c89766b5b189c6b5731a7efa9273877d9bf
-
SHA256
64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028
-
SHA512
c7b8bb8c807ac514baf4591d0e031b2814a8c3a6e9e5919223b6e3bc0c5c86235328ebeb46237a306b479c0edd859fab65353efa517e19dd5688d93a1f00259a
-
SSDEEP
12288:O2UxfcBpz6HkZO2el8uuzQEjzM6V1D31aaw4RNZ9faGFiSIHMSK7c63+P7/ai:DqfcBpGHOU8JQEnM4FwGNZ9xiSIHMSK0
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 904 set thread context of 392 904 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 79 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 392 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 392 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 392 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 392 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 904 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 904 wrote to memory of 392 904 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 79 PID 904 wrote to memory of 392 904 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 79 PID 904 wrote to memory of 392 904 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 79 PID 904 wrote to memory of 392 904 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 79 PID 904 wrote to memory of 392 904 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 79 PID 904 wrote to memory of 392 904 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 79 PID 904 wrote to memory of 392 904 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 79 PID 392 wrote to memory of 1396 392 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 38 PID 392 wrote to memory of 1396 392 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 38 PID 392 wrote to memory of 1396 392 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 38 PID 392 wrote to memory of 1396 392 64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe"C:\Users\Admin\AppData\Local\Temp\64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exeC:\Users\Admin\AppData\Local\Temp\64f2687dfeb39a2db9d95cecb789956a8eec42efe034943f70b54488c151d028.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:392
-
-