Analysis
-
max time kernel
135s -
max time network
221s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:33
Static task
static1
Behavioral task
behavioral1
Sample
d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe
Resource
win10v2004-20221111-en
General
-
Target
d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe
-
Size
1.3MB
-
MD5
38d919705b527e80454a351e80636ea4
-
SHA1
14cf860f2dc6d6b0c9896cfb2b1b43dcab72deb7
-
SHA256
d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0
-
SHA512
3ee551371d691a89b4503f4aefa107204aa5c1c9dda4c02e21c1710d22109105e6597e91fb5cd8ff7e53a83fb63fb41747653699116f4368b3c8a6d8fedb21ae
-
SSDEEP
24576:brKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak5:brKo4ZwCOnYjVmJPam
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exedescription pid process target process PID 1940 set thread context of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe -
Processes:
d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exepid process 672 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe 672 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe 672 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe 672 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe 672 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exedescription pid process target process PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe PID 1940 wrote to memory of 672 1940 d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe"C:\Users\Admin\AppData\Local\Temp\d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\d5a4bb3ce57c02e64df46ca11c08320d98fde566ce6de11fc1064c2fe5446ff0.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:672