Analysis
-
max time kernel
95s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:38
Static task
static1
Behavioral task
behavioral1
Sample
d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe
Resource
win10v2004-20221111-en
General
-
Target
d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe
-
Size
1.6MB
-
MD5
56639fddf167210627e118b18ab04014
-
SHA1
dff64982066a8b0725777610947efd15b9cb546b
-
SHA256
d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac
-
SHA512
4615e1b901c26d70120461e0eef1a72e2e8fe60e859309baff5828f90c1d7e6759b95c0e085490076202a7b14c928652024240d6be0ff0f279190dd87a000e90
-
SSDEEP
24576:9zD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYE:X6/ye0PIphrp9Zuvjqa0UidL
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exedescription pid process target process PID 1252 set thread context of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe -
Processes:
d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exepid process 856 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe 856 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe 856 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe 856 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe 856 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exedescription pid process target process PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe PID 1252 wrote to memory of 856 1252 d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe"C:\Users\Admin\AppData\Local\Temp\d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe"C:\Users\Admin\AppData\Local\Temp\d1edf577500ccc57b31b156bd16acf1fe2b97047116294329a0aed9577dd4aac.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:856