Analysis
-
max time kernel
120s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe
Resource
win10v2004-20221111-en
General
-
Target
ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe
-
Size
1.6MB
-
MD5
4ad492d61b7424f684db292d528b203c
-
SHA1
266712a8f7f795afbd85164908eab50c857e3edc
-
SHA256
ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57
-
SHA512
683b1231aa5934cec296a7d6f52e501cf1a68d234cb707f6c85a51999dff7eb3f94ea0e0bbc7ce154e4b91c16f8a641697527a3ea57adf8b1fc6b8a17be4210d
-
SSDEEP
24576:NzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYB:n6/ye0PIphrp9Zuvjqa0Uidq
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exedescription pid process target process PID 1044 set thread context of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe -
Processes:
ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exepid process 1504 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe 1504 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe 1504 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe 1504 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe 1504 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exedescription pid process target process PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe PID 1044 wrote to memory of 1504 1044 ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe"C:\Users\Admin\AppData\Local\Temp\ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe"C:\Users\Admin\AppData\Local\Temp\ab5aff3a33a9834a03e2a29ab1fb970d674d64f29c5510b3352e414d8e513e57.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-