Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 05:54
Static task
static1
Behavioral task
behavioral1
Sample
1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe
Resource
win10v2004-20221111-en
General
-
Target
1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe
-
Size
1.4MB
-
MD5
524a1923dd2952f0c3cc81e1d88ea548
-
SHA1
e788f96f1879d13a89c4f5e59bf33b838e3f4885
-
SHA256
1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e
-
SHA512
4486a4e85807ab227e52464cd59ed6af57b05588eccc00e3aecfcf65e0b58bbad2107f4d84ecc851b29c9613f0bb3aeba1e8e263a8398ec58f9b2fb6b7819430
-
SSDEEP
24576:hrK6dClXmekxlm1dl4r260n4dz0as5jc3AZ1COwiUP/5lq8Ah:hrBew72604doSw6ew2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exedescription pid process target process PID 816 set thread context of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe -
Processes:
1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exepid process 884 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 884 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 884 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 884 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 884 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exedescription pid process target process PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe PID 816 wrote to memory of 884 816 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe 1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe"C:\Users\Admin\AppData\Local\Temp\1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\1217d59c11f3e403fb9d37d3f47cbff8f7df113bebd328f450818e5efb44047e.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:884
-