Analysis
-
max time kernel
59s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:36
Static task
static1
Behavioral task
behavioral1
Sample
d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe
Resource
win10v2004-20220812-en
General
-
Target
d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe
-
Size
1.3MB
-
MD5
d7e4fb46951f6820eeed2380dc7df77a
-
SHA1
3c63abe94af67bdfd21ab368ad29b6dfafa2af4d
-
SHA256
d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67
-
SHA512
be457fb07a600f981844d8f0b04ddec472ff4270fe47fab2a0f668503ba27c6a948359874a31407e0186326d0b64998dc75ca5850d26bf1c7db9d80c0b39bee3
-
SSDEEP
24576:JDASdSysJOcj0VQpWbl7s2LP0CXuiAayiWASALUgv2j6R6XEVeRs9HgVfgBE:OSQtk2zQytkgis6yxQE
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exedescription pid process target process PID 960 set thread context of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe -
Processes:
d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exepid process 1312 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe 1312 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe 1312 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe 1312 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe 1312 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exedescription pid process target process PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe PID 960 wrote to memory of 1312 960 d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe"C:\Users\Admin\AppData\Local\Temp\d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\d347f37a46ac0b4244c6831da769bb6288342e1ca6ec0f963a7226de31892d67.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1312