Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe
Resource
win10v2004-20220812-en
General
-
Target
bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe
-
Size
1.6MB
-
MD5
eb1d8106aa9192f080ad40c0faee8e73
-
SHA1
5546c57fa65ce8e51295a6b5c513c0bd400933de
-
SHA256
bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7
-
SHA512
83a4dadb936d0989961b597a63502a47f409634f60b7fe46dfc2ec834079fd086546c40136603073ceb9470cf89bdfd7e7353196c00f9e7f79bc216f693cf45a
-
SSDEEP
24576:MFzJtFQQy+Yxa7kCleJkAKmP/0HWYs4LET3dJ6cTT10njVcyWjE8SDw/8rmxnZCP:IGQy1NvbduWE8S/mxZOebLk
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3684 set thread context of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3376 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 3376 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 3376 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 3376 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 3376 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80 PID 3684 wrote to memory of 3376 3684 bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe"C:\Users\Admin\AppData\Local\Temp\bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe"C:\Users\Admin\AppData\Local\Temp\bab4c6ed6925c1c6a8133a21f6bbce572b4e6e8fac0ead1afb88cf90aeea9ed7.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3376
-