Analysis
-
max time kernel
125s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:57
Static task
static1
Behavioral task
behavioral1
Sample
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe
Resource
win10v2004-20220812-en
General
-
Target
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe
-
Size
1.6MB
-
MD5
9ca3ca3f3dcd130c9982f246a7d361a7
-
SHA1
e6dc73bc59794df8f5555f546f75def83c24593f
-
SHA256
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4
-
SHA512
cddc99a4d31b5aa7b5ae3a5ef80554a87fab16d0d2c6218226564214ce625697df9a0a879ece1648b5e27be31aac65176e50629c7d8f89a1b3be1c29dbcb6d8b
-
SSDEEP
24576:NzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUY:n6/ye0PIphrp9Zuvjqa0Uid
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exedescription pid process target process PID 1068 set thread context of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe -
Processes:
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exepid process 868 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe 868 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe 868 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe 868 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe 868 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exedescription pid process target process PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe PID 1068 wrote to memory of 868 1068 c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe"C:\Users\Admin\AppData\Local\Temp\c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe"C:\Users\Admin\AppData\Local\Temp\c5f8f140db6759b51e31127cb4d923c4cc3ac33fd5351f64e37b21ef5275b8c4.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:868