Analysis
-
max time kernel
63s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:00
Static task
static1
Behavioral task
behavioral1
Sample
7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe
Resource
win10v2004-20220901-en
General
-
Target
7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe
-
Size
1.6MB
-
MD5
a94263fb11ddb21a6f17e15e07873249
-
SHA1
b0b26a9079bdba1d3a298bda9f51922a7a18354a
-
SHA256
7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7
-
SHA512
ebd231919781e21954d323314374be370a523da4e78a2ddf52f751e6178dc78d257aeebf29fb17bfc4913d87a046a4280acba69b0c4e2cae0cea3569ec11346b
-
SSDEEP
24576:9zD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYh:X6/ye0PIphrp9Zuvjqa0Uid6
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exedescription pid process target process PID 1660 set thread context of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe -
Processes:
7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exepid process 360 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 360 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 360 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 360 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 360 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exedescription pid process target process PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe PID 1660 wrote to memory of 360 1660 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe 7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe"C:\Users\Admin\AppData\Local\Temp\7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe"C:\Users\Admin\AppData\Local\Temp\7bc74a5a5ef85f19ec853a7395d65365a7cad8897fb582237e4046cd43f751f7.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:360
-