Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:52
Static task
static1
Behavioral task
behavioral1
Sample
c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe
Resource
win10v2004-20221111-en
General
-
Target
c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe
-
Size
1.3MB
-
MD5
3b74b76b7dadd4291c071ac5c184ff33
-
SHA1
e9649e86a2c79b98840ee402c444bc4eb3f816fa
-
SHA256
c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488
-
SHA512
896c49317ee62eeaaac45b3f5b13243730303490fc761dd3d47b607a8cb57ce94d2b21b40776fbbf88f6cc20ff9663cf28efe4a1ec72213872e504e13843dc83
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak+:jrKo4ZwCOnYjVmJPah
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exedescription pid process target process PID 1632 set thread context of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe -
Processes:
c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exepid process 1440 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe 1440 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe 1440 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe 1440 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe 1440 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exedescription pid process target process PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe PID 1632 wrote to memory of 1440 1632 c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe"C:\Users\Admin\AppData\Local\Temp\c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\c9407fc8820fd36d90fefdfffdc4054e2dd0db6f6054f65dbf9eefb606cb6488.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1440