Analysis
-
max time kernel
35s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe
Resource
win10v2004-20220901-en
General
-
Target
2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe
-
Size
84KB
-
MD5
0325c45c6a4335737044a33f71694360
-
SHA1
312c7cc96c85efe72b83c909433f73931cfc1963
-
SHA256
2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c
-
SHA512
71b0457940045e900ee52f5b4a72ba0fa1b962d5708b4d536de892b7bebefb5e110ef497f2c5d59c49a6c3441eddeb0e82754d9f365152f362b8d7485d34d8eb
-
SSDEEP
768:R3ncJu5hBXF2pmiq2V41xNmAFgGyi4XwP13GT9W28z/zMp5xAFiE3s:R3cJu5hBVWq2kN6LXwPVGT9lgA5gs
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1352 1412 WerFault.exe 9 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" 2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Internet Explorer\Main 2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2020 2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe 2020 2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1412 2020 2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe"C:\Users\Admin\AppData\Local\Temp\2608649c5acccc5086689b438a8972979e85f6f204910953601c8f8001370b4c.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1412 -s 27322⤵
- Program crash
PID:1352
-