Analysis
-
max time kernel
166s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe
Resource
win10v2004-20221111-en
General
-
Target
50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe
-
Size
1.3MB
-
MD5
6f75cdb7306280870b96faa9e3c44572
-
SHA1
67ee063f0a9ae002f0a4e5c41dfae295642b2e9f
-
SHA256
50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666
-
SHA512
da003ba7d709c42ea205e5cd6ae30441dbe475d7629d36cd67be5aff78b7fc9c46fa1ad5d996a24065857e0b310435974f14b7b09f20505f4a39fa9327bd0463
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakq:TrKo4ZwCOnYjVmJPaZ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1772 set thread context of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 964 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 964 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 964 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 964 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 964 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28 PID 1772 wrote to memory of 964 1772 50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe"C:\Users\Admin\AppData\Local\Temp\50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\50f236fa88260c558ce1a7fc8ea0db24b17c2d402b324a9a2d6e669a3b08f666.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:964
-