Overview
overview
10Static
static
331AA8EC187...9B.exe
windows7-x64
731AA8EC187...9B.exe
windows10-2004-x64
74B356B88FB...64.exe
windows7-x64
74B356B88FB...64.exe
windows10-2004-x64
75F71BE645E...BE.exe
windows7-x64
105F71BE645E...BE.exe
windows10-2004-x64
10AFD4216E93...72.exe
windows7-x64
10AFD4216E93...72.exe
windows10-2004-x64
10B4362FCD75...77.exe
windows7-x64
7B4362FCD75...77.exe
windows10-2004-x64
7BA8909EEF5...56.exe
windows7-x64
7BA8909EEF5...56.exe
windows10-2004-x64
7DE7CED2745...59.exe
windows7-x64
7DE7CED2745...59.exe
windows10-2004-x64
7$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/diversion.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/diversion.dll
Resource
win10v2004-20240319-en
General
-
Target
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
-
Size
366KB
-
MD5
81597a3dca5e7302766352fdcc2637a2
-
SHA1
ba8909eef5ee280ae43b935cf4ae38ccf21bde56
-
SHA256
d38d0696798fa5a27fb8ed8aa8b8a865d946aa2d7fee5c926eef97c7fee16f1a
-
SHA512
27050fa378b853e85302319ff7418f819abf9d8d006d426b83a5a1b2e084eacd4313e8c081a4be81f330bf2ac759ebc06fcd4c1a8aae776379a0665c311e482f
-
SSDEEP
6144:Ci7/WvtFHn58zLfavC+gXIqhboQInFcYy7gDEHHG+0htzeZ9wCXYHmF6UO8:nutQaK+tqmjGztoeZ9wCoHmoUF
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 3172 1344 BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe 90 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1344 BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1344 wrote to memory of 3172 1344 BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe 90 PID 1344 wrote to memory of 3172 1344 BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe 90 PID 1344 wrote to memory of 3172 1344 BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe 90 PID 1344 wrote to memory of 3172 1344 BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe 90 PID 1344 wrote to memory of 3172 1344 BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe 90 PID 1344 wrote to memory of 3172 1344 BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe 90 PID 1344 wrote to memory of 3172 1344 BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe"C:\Users\Admin\AppData\Local\Temp\BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe"C:\Users\Admin\AppData\Local\Temp\BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe"2⤵
- Drops startup file
PID:3172
-