Analysis
-
max time kernel
164s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 08:49
Static task
static1
Behavioral task
behavioral1
Sample
969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe
Resource
win10v2004-20221111-en
General
-
Target
969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe
-
Size
1.3MB
-
MD5
d34fdb20832dbd0a68da433db2c5f5ae
-
SHA1
16615a22dfdcb1ad06bfae610fe683e19dc5eb92
-
SHA256
969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00
-
SHA512
c1484de7d75f283a6a30fa8d5a0acf45ee430b1b41550d681ee829b4a35e0dd7e353061e42445a5add268ccdc029333187beece64c1af4d3931367abe114c067
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakk:7rKo4ZwCOnYjVmJPaf
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1180 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 1180 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 1180 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 1180 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 1180 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28 PID 2040 wrote to memory of 1180 2040 969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe"C:\Users\Admin\AppData\Local\Temp\969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\969d5204404cd1d68befa43d9f88ce44a025cbeb43851a8a19ee044e643c2d00.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1180
-