Analysis
-
max time kernel
21s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:30
Static task
static1
Behavioral task
behavioral1
Sample
d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe
Resource
win10v2004-20220812-en
General
-
Target
d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe
-
Size
1.1MB
-
MD5
8abb84e85a72f0823e4443c1e2be6e16
-
SHA1
42baa4307d802113748e6a6643b983614ed1d9a9
-
SHA256
d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505
-
SHA512
6a87357bf6a0afcf2e772aa2023548cc3a62052533732ab16436d09995ed20a01b0c5b988d96b70c6bd8d38db4386429efa517d6c0df467a4982e300f341619e
-
SSDEEP
24576:kjmOYKa/TY9ZPFXntEi+m/ZWOLB28TS3985qEeP02wg:kqvkHZt7+mBWABf202f
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exedescription pid process target process PID 1220 set thread context of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe -
Processes:
d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exepid process 944 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe 944 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe 944 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe 944 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe 944 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exedescription pid process target process PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe PID 1220 wrote to memory of 944 1220 d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe"C:\Users\Admin\AppData\Local\Temp\d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\d2ab7d157878ae132cdcdd10a6497cd5412188ab053afe5d04cbf086996d4505.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:944
-