Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 05:54
Static task
static1
Behavioral task
behavioral1
Sample
12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe
Resource
win10v2004-20221111-en
General
-
Target
12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe
-
Size
1.4MB
-
MD5
431a4f0fd9d8d5ced73dde41804f0d07
-
SHA1
c9fe5d7bdd0b973e311a9c9bcd959d9c8933992a
-
SHA256
12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7
-
SHA512
499e43acf653f2b08c73ff6606e9ed18ab4f5f1710d5bb58080dea9911874e81e14597b36bbf01e6154f2e581739e4ee84c62afb9ce8fe84be5558c71fa6ecf5
-
SSDEEP
24576:tKWQBT4nVU85afaniK/792DxAA4PNn0DLg78E2y2R3rh+Zx1kyFM:tNQJJ2B2WZd0DUGf3d+ZLkyq
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exedescription pid process target process PID 2024 set thread context of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe -
Processes:
12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exepid process 1744 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 1744 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 1744 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 1744 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 1744 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exedescription pid process target process PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe PID 2024 wrote to memory of 1744 2024 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe 12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe"C:\Users\Admin\AppData\Local\Temp\12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\12bd9208722eb4b8649f1de0fd26f86cafb151002c44684a54439f33c4f4bca7.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-