Analysis
-
max time kernel
36s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:48
Static task
static1
Behavioral task
behavioral1
Sample
0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe
Resource
win10v2004-20221111-en
General
-
Target
0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe
-
Size
1.1MB
-
MD5
68fe8ff9c8a85bb96197f0b403db5940
-
SHA1
3b2a45e679c1d4b137a31d630829cce0b772fcc0
-
SHA256
0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2
-
SHA512
cf5cd906d081b87ba5ce04fbf8453ad9635f3cfcff430d58e04d1f697f3cb3bdfacf891c741e1b980aea308c8dbfac4c3878e7bea3f14e777587ab47408c2c1c
-
SSDEEP
24576:iio2C4Tz86EE1by3swR9HrwNmojHuD/bsytUltKo+5+VYrle5si:k4TzJJm9R9kFTSbNtkwo+5Vrle57
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exedescription pid process target process PID 1612 set thread context of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe -
Processes:
0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exepid process 788 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 788 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 788 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 788 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 788 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exedescription pid process target process PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe PID 1612 wrote to memory of 788 1612 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe 0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe"C:\Users\Admin\AppData\Local\Temp\0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\0d262a357b90750b83727f61d76a58aa10736890326c5e7ab734034364d4f7d2.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:788