Analysis
-
max time kernel
134s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe
Resource
win10v2004-20220812-en
General
-
Target
931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe
-
Size
1.3MB
-
MD5
99f1f048c3d57e332ab4f3a27e406fc6
-
SHA1
9a6209c3861ee2c616fbddaf3419990fa98c33ea
-
SHA256
931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49
-
SHA512
7896d6bae8e971e69908e63e89113688a729d92486dd9cf275412578230ef2a42ae3ce66a6a701558d1934c073b34679f2ffdb1dbb1edad6a0a4f43d063a7f59
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaky:7rKo4ZwCOnYjVmJPa9
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2040 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 2040 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 2040 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 2040 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 2040 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28 PID 2032 wrote to memory of 2040 2032 931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe"C:\Users\Admin\AppData\Local\Temp\931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\931b76240934770752df8c37ba9df5efc6fdb0a4db6cd772f3f4be050ad16d49.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-