Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 05:48
Static task
static1
Behavioral task
behavioral1
Sample
19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe
Resource
win10v2004-20220812-en
General
-
Target
19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe
-
Size
1.4MB
-
MD5
bb03c61cf1f2c0577f3e56313a0819ae
-
SHA1
93aa940383302517f4204b74b7e9d8c454390075
-
SHA256
19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53
-
SHA512
31bf2dc7f51ba41fd7343ae053fd1379be77948cde82fbc120f0d85db285c171ff74b0431cda9bdcb4a09efd8fb0e231f79dbbf290a9a00efb756ddbc3562e3c
-
SSDEEP
24576:hrK6dClXmekxlm1dl4r260n4dz0as5jc3AZ1COwiUP/5lq8AV:hrBew72604doSw6ewe
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exedescription pid process target process PID 840 set thread context of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe -
Processes:
19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exepid process 2032 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 2032 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 2032 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 2032 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 2032 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exedescription pid process target process PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe PID 840 wrote to memory of 2032 840 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe 19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe"C:\Users\Admin\AppData\Local\Temp\19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\19252023ac3ad2bda88d9025e45b816d50553b5879f06f2db6dfb563fcf7ea53.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-