Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 05:53
Static task
static1
Behavioral task
behavioral1
Sample
1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe
Resource
win10v2004-20221111-en
General
-
Target
1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe
-
Size
1.4MB
-
MD5
978ea9f1ebeb0d71f96a3433b93e2847
-
SHA1
fb26a7edda1af6a9530ebc867c3e1d1087c1417e
-
SHA256
1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496
-
SHA512
9074faba36f028de90976c7e084a693fc43fc653efd6717cba554920b4217d07794f9664214c15748fd211463543fe0ca896f29bca7c681538162d1bce5b46c6
-
SSDEEP
24576:bKWQBT4nVU85afaniK/792DxAA4PNn0DLg78E2y2R3rh+Zx1kyF3:bNQJJ2B2WZd0DUGf3d+ZLkyR
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exedescription pid process target process PID 2000 set thread context of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe -
Processes:
1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exepid process 2032 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 2032 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 2032 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 2032 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 2032 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exedescription pid process target process PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe PID 2000 wrote to memory of 2032 2000 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe 1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe"C:\Users\Admin\AppData\Local\Temp\1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\1307bdcbecea47734be5ac29a62447bfdcf369b6eb4ddd3b5a26fe074ce1d496.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-