Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:40
Static task
static1
Behavioral task
behavioral1
Sample
d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe
Resource
win10v2004-20220812-en
General
-
Target
d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe
-
Size
1.5MB
-
MD5
06187d66738098bb67560b70722f5b43
-
SHA1
2b2bc3745d0aa6f67be9d974d3762c6daa6fc9e1
-
SHA256
d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20
-
SHA512
4f04f39944d3d587beac6f21e1583122fa4c9a7306bd823af6aed8675d7d633ba1b4b84aa698f0f250f746539259f3c2f2e8e06ef52812db6377ac25a4d731fe
-
SSDEEP
24576:1zD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYq:P6/ye0PIphrp9Zuvjqa0Uid1
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exedescription pid process target process PID 1768 set thread context of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe -
Processes:
d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exepid process 1112 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe 1112 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe 1112 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe 1112 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe 1112 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exedescription pid process target process PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe PID 1768 wrote to memory of 1112 1768 d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe"C:\Users\Admin\AppData\Local\Temp\d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe"C:\Users\Admin\AppData\Local\Temp\d06f3bb44f5a2145dfd370e906927a8be90ae7ec078642ef35cd1c7d53232e20.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1112