Analysis
-
max time kernel
52s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:58
Static task
static1
Behavioral task
behavioral1
Sample
c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe
Resource
win10v2004-20221111-en
General
-
Target
c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe
-
Size
1.3MB
-
MD5
fddb4519512dc17f88fd567acd346144
-
SHA1
8f7b232a53978b5750dc6a843948c5ce497c99f5
-
SHA256
c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844
-
SHA512
3512835b93200fc391df190f9dd7c7bd021ae597322f8e6737dd01ec03d3069b406eb0756265169e152f16070d5cced604aced0275a68c500ac3cac5cbdce6d4
-
SSDEEP
24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakn:TrKo4ZwCOnYjVmJPa0
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exedescription pid process target process PID 1972 set thread context of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe -
Processes:
c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exepid process 280 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe 280 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe 280 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe 280 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe 280 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exedescription pid process target process PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe PID 1972 wrote to memory of 280 1972 c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe"C:\Users\Admin\AppData\Local\Temp\c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\c5c57406420786a4b7dc0f088715e9c7dc2fd1ee04a80d2761d0f84584a46844.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:280