Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:47
Static task
static1
Behavioral task
behavioral1
Sample
1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe
Resource
win10v2004-20221111-en
General
-
Target
1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe
-
Size
1.1MB
-
MD5
37a7d6f6d5d154237b854998aae3b27c
-
SHA1
d108391038a324c1619adc78c1f29a5831fb824f
-
SHA256
1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4
-
SHA512
95ca2d76037ba1eaed556e0ef74aa69e7f3144b1e8e173000cb28f02cfc7849bf075459bd2b5d9be95f267894d64bfc1c2dead7be0604217c41bcfb8bef2c087
-
SSDEEP
24576:yio2C4Tz86EE1by3swR9HrwNmojHuD/bsytUltKo+5+VYrle5sx:U4TzJJm9R9kFTSbNtkwo+5Vrle5c
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exedescription pid process target process PID 860 set thread context of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exepid process 2960 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 2960 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 2960 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 2960 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 2960 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exedescription pid process target process PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe PID 860 wrote to memory of 2960 860 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe 1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe"C:\Users\Admin\AppData\Local\Temp\1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1baeef75e1c697ff4d57cf97de23233c225100e1de052b7306f8eda7e31a7cc4.exe
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2960-132-0x0000000000000000-mapping.dmp
-
memory/2960-133-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/2960-134-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/2960-135-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/2960-136-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/2960-137-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB