Analysis
-
max time kernel
114s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:18
Static task
static1
Behavioral task
behavioral1
Sample
93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe
Resource
win10v2004-20220812-en
General
-
Target
93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe
-
Size
1.3MB
-
MD5
aa88f1f2aa4bb28d781e6a84d7ecf704
-
SHA1
dcaac987d63f8ba9955bc70cd17056e0adbfa1ed
-
SHA256
93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114
-
SHA512
5f32994e83a166de4c942a3823691d5a3bc4984a7ea953d777cbb6a51a3edf73e525f206bd0de72b3adaf0df65a65bf828043e14f4d69aceba06dd0fd8cb8fae
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakH:zrKo4ZwCOnYjVmJPas
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exedescription pid process target process PID 1068 set thread context of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe -
Processes:
93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exepid process 868 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 868 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 868 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 868 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 868 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exedescription pid process target process PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe PID 1068 wrote to memory of 868 1068 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe 93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe"C:\Users\Admin\AppData\Local\Temp\93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\93fc1d310202a1ec19de9a942a87811b1f0eaf1bd3dc25e1705f5b06c6cd0114.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:868
-