Analysis
-
max time kernel
3s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe
Resource
win10v2004-20221111-en
General
-
Target
ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe
-
Size
178KB
-
MD5
81a7f10532da531e01e0fa556c08aaaa
-
SHA1
ac002bc17c84ce2f8a3727ac248e183b6c975cbd
-
SHA256
ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3
-
SHA512
8b32f5259c5525db2fa813745e4bc106abbfac741b4b7e30667333148f22ca6cbf79ad2095ac5948df2a27b8a5c583e1254a6e51ae078669c84f02f4492e04e2
-
SSDEEP
3072:AZG09XYctlcMHCo8sztVFYshg/qxi506EVkcHLQgDb9FQQszmC3loqgCUPtz:H0hUgbrtnhh/6EPLQkQQszFlDgCuz
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 952 2032 ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe 28 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2032 wrote to memory of 952 2032 ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe 28 PID 2032 wrote to memory of 952 2032 ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe 28 PID 2032 wrote to memory of 952 2032 ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe 28 PID 2032 wrote to memory of 952 2032 ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe 28 PID 2032 wrote to memory of 952 2032 ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe 28 PID 2032 wrote to memory of 952 2032 ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe"C:\Users\Admin\AppData\Local\Temp\ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exeC:\Users\Admin\AppData\Local\Temp\ba47f5b7a398d88177a732ac3e1b220de74ce40ed23e12f606182443e40cddf3.exe2⤵PID:952
-