Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:16
Static task
static1
Behavioral task
behavioral1
Sample
ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe
Resource
win10v2004-20221111-en
General
-
Target
ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe
-
Size
1.3MB
-
MD5
2f38ceb75f72fe97aaaa5ca3af0d084c
-
SHA1
500c60fa8667e9fea705aece4591ebb3b0f67ad3
-
SHA256
ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990
-
SHA512
834396d471839ebe928676d944b20ddc7b2d644bc0aec5bd0daf5c534ff6335fbeea4a8dd67de424ea9e9d913e7dad0bfedcc0d2e9895e9c38601c8335c2cfb2
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakh:jrKo4ZwCOnYjVmJPay
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exedescription pid process target process PID 1200 set thread context of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exepid process 1680 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe 1680 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe 1680 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe 1680 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe 1680 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exedescription pid process target process PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe PID 1200 wrote to memory of 1680 1200 ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe"C:\Users\Admin\AppData\Local\Temp\ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\ba14ead5527a45cf43be9810bf61cbf7527920544ea41031c21e546c29976990.exe
- Suspicious use of SetWindowsHookEx
PID:1680