Analysis
-
max time kernel
129s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:06
Static task
static1
Behavioral task
behavioral1
Sample
9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe
Resource
win10v2004-20220812-en
General
-
Target
9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe
-
Size
1.3MB
-
MD5
80e5cc59eba97fd979eab220f41bd265
-
SHA1
4789a36fe45e398f98c01fc7f64013040214974b
-
SHA256
9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa
-
SHA512
2d3951f1cf963c7ed22c8e7a96b4b9dbc537c3dcbf47298ab214ff276051763cd87d9b6a944071f7ca46d3926b57a0ce7b87603659db97dae14258f6d83890a2
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakt:zrKo4ZwCOnYjVmJPa+
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exedescription pid process target process PID 1612 set thread context of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe -
Processes:
9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exepid process 788 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 788 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 788 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 788 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 788 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exedescription pid process target process PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe PID 1612 wrote to memory of 788 1612 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe 9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe"C:\Users\Admin\AppData\Local\Temp\9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\9b8471bbf051b98db42227baebe6d82e390b90eb15f5d6e06fb0b63b56783dfa.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:788