Analysis
-
max time kernel
47s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:26
Static task
static1
Behavioral task
behavioral1
Sample
a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe
Resource
win10v2004-20221111-en
General
-
Target
a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe
-
Size
1.1MB
-
MD5
31f71d3be9ebb5543f1c295e5c12a524
-
SHA1
30231d8f503caeb4a647c80eb06684238dcddaf5
-
SHA256
a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a
-
SHA512
39f2490cfad99ddd5ae846114b6c1284aec34e68581cdab6d55e27193b64f0d416269790b13c1d9696aaf9c8a5056d3438832619a519ca1bc9afde486f043fd6
-
SSDEEP
24576:iio2C4Tz86EE1by3swR9HrwNmojHuD/bsytUltKo+5+VYrle5s/:k4TzJJm9R9kFTSbNtkwo+5Vrle5y
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exedescription pid process target process PID 1944 set thread context of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe -
Processes:
a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exepid process 772 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe 772 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe 772 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe 772 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe 772 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exedescription pid process target process PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe PID 1944 wrote to memory of 772 1944 a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe"C:\Users\Admin\AppData\Local\Temp\a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\a17f194fc09de10a12730f0babd69603cf108b568978412ba7eceef8ccd7625a.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:772
-