Analysis
-
max time kernel
27s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:37
Static task
static1
Behavioral task
behavioral1
Sample
adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe
Resource
win10v2004-20220901-en
General
-
Target
adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe
-
Size
1.3MB
-
MD5
74132b5cef54e67c16b23e3314e1b934
-
SHA1
f3041b34b68d435f8403d2529f5b3e92dc116aae
-
SHA256
adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7
-
SHA512
b305e9793320d710d716d41219b60f077984a3aa5f83948b16adc0f49d9e4ae2b38440a478045d14a7c98cd2a93c95d76477a706eb93375f5aea9e4034986f81
-
SSDEEP
24576:DrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakf:DrKo4ZwCOnYjVmJPaU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exedescription pid process target process PID 884 set thread context of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe -
Processes:
adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exepid process 1120 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe 1120 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe 1120 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe 1120 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe 1120 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exedescription pid process target process PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe PID 884 wrote to memory of 1120 884 adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe"C:\Users\Admin\AppData\Local\Temp\adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\adeb8cf0fabc2b738508e403212addb559547b30680449a811c2ce33514f9dc7.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1120