Analysis
-
max time kernel
98s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe
Resource
win10v2004-20221111-en
General
-
Target
4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe
-
Size
1.3MB
-
MD5
a0befe0ace9caf4553a54d3d5e48c729
-
SHA1
2cc413f9bbbda3f28cbf3c28997d1315f1c9fb7a
-
SHA256
4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272
-
SHA512
e8470f7f03a2b2c3e9f200c78f41abb035cd4ada0bce75b23a03e88778c7ab094140af5ebd13337dc5dc7af04db2493c6e917a407d53bfd45b1075d09e2ef9cb
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakF:zrKo4ZwCOnYjVmJPa+
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1000 set thread context of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 840 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 840 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 840 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 840 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 840 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27 PID 1000 wrote to memory of 840 1000 4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe"C:\Users\Admin\AppData\Local\Temp\4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\4fd59f54253054d02eb67fb4a0b7341bc42313dbb223e900b066d6eae68ad272.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:840
-