Analysis
-
max time kernel
188s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:06
Static task
static1
Behavioral task
behavioral1
Sample
e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe
Resource
win10v2004-20220812-en
General
-
Target
e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe
-
Size
1.3MB
-
MD5
4d48b2a209c7aed9efde9ab61b4ea221
-
SHA1
0e93b2dc36190692812dafe93233349e911ee719
-
SHA256
e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf
-
SHA512
a8c04035c3f5ef06e3a192a5858e4700be28febd938db0b368e1a58d7712cc87b8225afabe39df82c4b1cf4efe31948388cba19bf9bb37a2941c2d5ed94097ef
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak3:zrKo4ZwCOnYjVmJPag
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exedescription pid process target process PID 1884 set thread context of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe -
Processes:
e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exepid process 292 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe 292 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe 292 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe 292 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe 292 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exedescription pid process target process PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe PID 1884 wrote to memory of 292 1884 e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe"C:\Users\Admin\AppData\Local\Temp\e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\e64aaac86f68daa107b3f286495fb3b54b027714ae0d1693cfab5b3217c67abf.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:292