Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 22:48
Static task
static1
Behavioral task
behavioral1
Sample
2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe
Resource
win10v2004-20231023-en
General
-
Target
2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe
-
Size
816KB
-
MD5
ba8978c13ced87898f75e3ed17fc8928
-
SHA1
40429febc6fb8fd946efb96cb4b0e2109b224a7d
-
SHA256
2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da
-
SHA512
efc465b3887d1ad4bb05a038a7ff2ea6630b8f7c01166edb76dea966aaffb577baf15fdb4a04fa9e29cb8abfd4dbdc0c9587ca55c7c41726fdc841fd75fa0467
-
SSDEEP
12288:1B23MOa6Kpm3iMhG/NtsZvpzwA93sVcxfr91HnKL4HjXlgm9xo1mlSS8xv39t3b2:1Y3MOaNpAiiG/UZv1wabrDKLUjum9J
Malware Config
Signatures
-
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3384 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 99 PID 4952 wrote to memory of 3384 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 99 PID 4952 wrote to memory of 3384 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 99 PID 4952 wrote to memory of 2168 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 98 PID 4952 wrote to memory of 2168 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 98 PID 4952 wrote to memory of 2168 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 98 PID 4952 wrote to memory of 4512 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 97 PID 4952 wrote to memory of 4512 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 97 PID 4952 wrote to memory of 4512 4952 2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe 97 PID 4512 wrote to memory of 4368 4512 net.exe 102 PID 3384 wrote to memory of 2908 3384 net.exe 100 PID 4512 wrote to memory of 4368 4512 net.exe 102 PID 4512 wrote to memory of 4368 4512 net.exe 102 PID 3384 wrote to memory of 2908 3384 net.exe 100 PID 3384 wrote to memory of 2908 3384 net.exe 100 PID 2168 wrote to memory of 1048 2168 net.exe 101 PID 2168 wrote to memory of 1048 2168 net.exe 101 PID 2168 wrote to memory of 1048 2168 net.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe"C:\Users\Admin\AppData\Local\Temp\2786741632b32da69849d5cc8c6da035e3de52add7916d0eb7ac20aceed4e3da.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\net.exenet localgroup administrator ÒªÃÜÂë¼ÓQQ2990353838 /add2⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrator ÒªÃÜÂë¼ÓQQ2990353838 /add3⤵PID:4368
-
-
-
C:\Windows\SysWOW64\net.exenet user ÒªÃÜÂë¼ÓQQ2990353838 123456789 /add2⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user ÒªÃÜÂë¼ÓQQ2990353838 123456789 /add3⤵PID:1048
-
-
-
C:\Windows\SysWOW64\net.exenet user Administrator 1234567892⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Administrator 1234567893⤵PID:2908
-
-