Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482.exe
Resource
win10v2004-20240412-en
General
-
Target
ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482.exe
-
Size
16KB
-
MD5
78c2a63f3c0613e626ac3d3efe814a38
-
SHA1
0dcbaefed4892be2afa6e13bd793b87c61135952
-
SHA256
ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482
-
SHA512
4fb4b6c1fe55670f1b95afb0e5e0d3f10d16d6be2d33940ad6e649dce7fa8060cd9afdd7cda883abc4102d1ad0291ac969594eef9ecec9d4076343360f0911ac
-
SSDEEP
48:yWwPr/M7f+2sDCfAKkXYKqqsb37lAIaFl1fHd3r1vgFwR0EfK2:/8k7TOuLVrrl5aFHF2Ei2
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4516 ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4516 wrote to memory of 452 4516 ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482.exe 87 PID 4516 wrote to memory of 452 4516 ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482.exe 87 PID 4516 wrote to memory of 452 4516 ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482.exe"C:\Users\Admin\AppData\Local\Temp\ace0d8e97ab300ec713fdf043afb2e9d6e3f353869a571e2a1d908538620f482.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\cmd.execmd.exe /c 1.vbs2⤵PID:452
-