Analysis
-
max time kernel
51s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:34
Static task
static1
Behavioral task
behavioral1
Sample
14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe
Resource
win10v2004-20220812-en
General
-
Target
14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe
-
Size
1.1MB
-
MD5
7bd8dd4e0d26dea2e74e4a7d88991692
-
SHA1
679becce8f68d3bdd26822658d16f0d2023ef8fa
-
SHA256
14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe
-
SHA512
0f4a494ea2ec9130465474dabd412b062c2c46eafb60b20eadc03e26776bc671a0d7cc2291307fd31335f142a7191d9bac310feb74769c0d5155ed294fba807d
-
SSDEEP
24576:zjmOztIjpVbUJ44R/DDK2s5mNZRzOUCrA/N3rH:zqAtI704g/D3Tm037
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exedescription pid process target process PID 1388 set thread context of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe -
Processes:
14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exepid process 1536 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 1536 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 1536 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 1536 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 1536 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exedescription pid process target process PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe PID 1388 wrote to memory of 1536 1388 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe 14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe"C:\Users\Admin\AppData\Local\Temp\14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\14520f483f96465f8c3685b4a75d29a695366af63698c9b0cebb68a26062d5fe.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1536
-