Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
23-11-2023 14:06
Static task
static1
Behavioral task
behavioral1
Sample
36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe
Resource
win10v2004-20231023-en
General
-
Target
36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe
-
Size
9.9MB
-
MD5
65770593cc32bd2a9fc11c5d78029872
-
SHA1
6c03e51e7bc30117d90ef6584745ea8b5cb292a5
-
SHA256
36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d
-
SHA512
17686f386cbe62b4059bc69f5384e2dde95200a7f904307c50ea92d76b27de3b2ae866487a568ed908e4b9bede49737c3965838ac1ab3598011815ae14502b80
-
SSDEEP
196608:iTew5WbQLOZchS2wzdIW1bdyFTvgoF0baTXaTx5b4j7N24/bofB:QeQdAdzbA+I0mTqNx4jdof
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28 PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28 PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28 PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28 PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28 PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28 PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28 PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28 PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28 PID 2600 wrote to memory of 540 2600 36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe"C:\Users\Admin\AppData\Local\Temp\36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe"C:\Users\Admin\AppData\Local\Temp\36a31b4e1042622d5f2e4124bbb751e5aac4329f521a99fb55445a5fc4ebd57d.exe"2⤵PID:540
-