Analysis
-
max time kernel
37s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:40
Static task
static1
Behavioral task
behavioral1
Sample
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
Resource
win10v2004-20221111-en
General
-
Target
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
-
Size
1.3MB
-
MD5
9d20bc93fa446326d8aef30a77791bd9
-
SHA1
284c1428bd62454266a90f3ee2f042a474c4e2a2
-
SHA256
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f
-
SHA512
5a366aeb40e1cea2eb27a782af6c55178d3e49a438007fefacdba2226cf94daa852fe169853ab1dcb2da35e45b2bc33217ecffec21c6ee20996860877469f297
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:TrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exedescription pid process target process PID 2028 set thread context of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe -
Processes:
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exepid process 2032 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe 2032 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe 2032 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe 2032 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe 2032 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exedescription pid process target process PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe PID 2028 wrote to memory of 2032 2028 d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe"C:\Users\Admin\AppData\Local\Temp\d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\d07c8740159e09fdba0bc984a9bb55818405ed02b1801a746a3b98cf81244e8f.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032