Analysis
-
max time kernel
98s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2023 00:37
Static task
static1
Behavioral task
behavioral1
Sample
a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe
Resource
win10v2004-20231023-en
General
-
Target
a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe
-
Size
312KB
-
MD5
ba39555586303ef7ecdbd68da07a79a9
-
SHA1
9dbb6bc2cc1dab8942fcf3624bc0312afc620de3
-
SHA256
a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419
-
SHA512
250a2ac5327a83be33ab43e5e7f9ecb715dc4df1cef9a65a9606ae726e8bf34234f642fc77591cf1d7ba32d69c6496632aa675e0f8adeac6e48644f05f13570d
-
SSDEEP
3072:E5Bl3NVJJal79aX3LnbViY+vtkUsCnmh4uc25Bmmbd3f8Z6xDmNN8+f7olES:E5BtvadeLnJiYZ+up5BmmbaWmNNFQE
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3252 a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe 3252 a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe 3252 a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3252 wrote to memory of 3312 3252 a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe 89 PID 3252 wrote to memory of 3312 3252 a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe"C:\Users\Admin\AppData\Local\Temp\a15a45f5d1fbc50ead3b0d3e8a4a800a904ccf17e59dee014a24c70ec66bc419.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3312
-