Analysis
-
max time kernel
190s -
max time network
284s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:37
Static task
static1
Behavioral task
behavioral1
Sample
6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe
Resource
win10v2004-20221111-en
General
-
Target
6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe
-
Size
1.3MB
-
MD5
0eea74c4c4194645c46514833f09d13a
-
SHA1
e0e8fafabdafc468c9a6ef7c3f6e45e7a1bad5e9
-
SHA256
6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb
-
SHA512
09f1e5dc7cc6c32962948a17a1dcbddb7c973f2b0922d26b2b51f9585f4dc421526ecfe032046901f62ced3e47ca6ddf9a3f97bfadf40d864aa8fa5d1a108ace
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:jrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exedescription pid process target process PID 560 set thread context of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe -
Processes:
6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exepid process 1516 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 1516 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 1516 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 1516 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 1516 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exedescription pid process target process PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe PID 560 wrote to memory of 1516 560 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe 6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe"C:\Users\Admin\AppData\Local\Temp\6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\6647cc9fb88bafe3d40d4c67a3618c94f7a3e1b33cc6fea8acf6a5cf0df265eb.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1516
-