Analysis
-
max time kernel
36s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:31
Static task
static1
Behavioral task
behavioral1
Sample
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
Resource
win10v2004-20221111-en
General
-
Target
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
-
Size
1.1MB
-
MD5
296f390eb34cc053e6c787f209382e91
-
SHA1
306bd0d215be7e89452c58bcf93ee6ee633629ae
-
SHA256
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f
-
SHA512
ab57f16377108f1c5a1eaa57ddf22efe5414e7160af4da1f18aced00a2c3f069f3735e834fb20680787a17b81bc71a2e5b0fa1f51c53063e982ec284db28b4cf
-
SSDEEP
24576:zjmOztIjpVbUJ44R/DDK2s5mNZRzOUCrA/N3rb:zqAtI704g/D3Tm03P
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exedescription pid process target process PID 1492 set thread context of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe -
Processes:
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exepid process 1740 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe 1740 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe 1740 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe 1740 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe 1740 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exedescription pid process target process PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe PID 1492 wrote to memory of 1740 1492 a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe"C:\Users\Admin\AppData\Local\Temp\a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\a60f471694bcf97aa602a3865811080d71f05c6e98993e1d098d2cab6db5780f.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-