Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 14:13
Static task
static1
Behavioral task
behavioral1
Sample
c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe
Resource
win10v2004-20230220-en
General
-
Target
c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe
-
Size
4.7MB
-
MD5
0c9442acb9faca3c62d8410cef94630b
-
SHA1
9e894f022065313bc6dad4094ccd30e14cafa997
-
SHA256
c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c
-
SHA512
254d66b97a4f595a260fe28d3107123277e572dafc6d3c3448aa46607cda5476dfe597b35d837626a5272669e9827c3c4ebf2f709672960241745f51b45899c1
-
SSDEEP
98304:VfU5v2k863Ya07zLCj2ut4K0UfGcZzPrRM3BGX8g+NIt6LS9p:u2k863Ya07w50ZORM3BK8m6LS9p
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4088 c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe 4088 c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe 4088 c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe 4088 c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe 4088 c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4764 4088 c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe 83 PID 4088 wrote to memory of 4764 4088 c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe"C:\Users\Admin\AppData\Local\Temp\c1570601ffcef8829d2e958eeacb7beb2739d59c89532e8413e134c3640acf9c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\system32\bcdedit.exeC:\Windows\sysnative\bcdedit.exe2⤵PID:4764
-