Analysis
-
max time kernel
47s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:38
Static task
static1
Behavioral task
behavioral1
Sample
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
Resource
win10v2004-20220812-en
General
-
Target
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
-
Size
1.3MB
-
MD5
ec3b14142e8bf93c5c8a8f55ee3090ac
-
SHA1
7d489c8912293cddfae24616180ac03709d43a54
-
SHA256
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629
-
SHA512
e913996489b439fdd09f705374c87a9ced846687dad0c1b745f5d1a724f5681da32a8dfb7b37f75ca978609206a8f8deae5bcb03cb91d6cf2833f0d6b02c3478
-
SSDEEP
24576:7rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak4:7rKo4ZwCOnYjVmJPav
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exedescription pid process target process PID 1192 set thread context of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe -
Processes:
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exepid process 1272 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 1272 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 1272 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 1272 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 1272 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exedescription pid process target process PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe PID 1192 wrote to memory of 1272 1192 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe 8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe"C:\Users\Admin\AppData\Local\Temp\8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\8864a75bde7777ca4ee34b57c85a4a78b007b350e8cbff2b1ee9a9e49c37b629.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272