Analysis
-
max time kernel
122s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe
Resource
win10v2004-20221111-en
General
-
Target
ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe
-
Size
1.3MB
-
MD5
62b6d9bdfe72db85d6fd2c53a1021702
-
SHA1
cb5482f491363d1f4475305f4665000f3b8e2006
-
SHA256
ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e
-
SHA512
0ec871b4bded6ad128489b0c862b3ae8e6f7c826e54d754bc896ab0c1d404e9227fad1e311f902db7156b82cbeb79855a8ea27349dae56c0043eaba97d864761
-
SSDEEP
24576:DrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakd:DrKo4ZwCOnYjVmJPa+
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exedescription pid process target process PID 948 set thread context of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe -
Processes:
ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exepid process 624 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe 624 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe 624 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe 624 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe 624 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exedescription pid process target process PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe PID 948 wrote to memory of 624 948 ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe"C:\Users\Admin\AppData\Local\Temp\ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\ab545ba02966e0b76232c232f8ffa84811805a8c7962642c6d01ea7d6ed8b30e.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:624