Analysis
-
max time kernel
28s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe
Resource
win10v2004-20221111-en
General
-
Target
1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe
-
Size
1.3MB
-
MD5
9c5b25b5dc3223c8bbd6b16dc125a3c2
-
SHA1
29c73b47ef6711a92b7ba61fa64b53a94b66a34f
-
SHA256
1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6
-
SHA512
0afa520571627ab0444017213c8d2f92048bae3ca1fee512ea0b30e30a0440f9b5fe31a5ffdd0c75413a30b000a93420847543998e60f1bf22b1f50614d1c010
-
SSDEEP
24576:fxP8/8Mle/jYpx1BNgldCjjhyYQCuA0VaBVSK3yg13J2uUme4ZDDx:fpILclE5yYQ/daqrKJ2Se4ZZ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1272 set thread context of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1724 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 1724 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 1724 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 1724 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 1724 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28 PID 1272 wrote to memory of 1724 1272 1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe"C:\Users\Admin\AppData\Local\Temp\1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\1c6c5e8ec48a966a60785aabbe2d03567906e40092342d8061238022e6b7aec6.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-