Analysis
-
max time kernel
135s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:49
Static task
static1
Behavioral task
behavioral1
Sample
39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe
Resource
win10v2004-20220812-en
General
-
Target
39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe
-
Size
1.3MB
-
MD5
e55ee0f3c0995253af640a031c78a4f5
-
SHA1
b8f8f7cc41349149a8d646474e71caf8be657381
-
SHA256
39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51
-
SHA512
7a0cdd9e44c47ccc085eb1682edbaa1a3b7bc9d24278d2da8adcfa317fd1e26e66add6c1e91306e9c11c19135714c5887831949b2c7ef64061e319ef367c1429
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakr:jrKo4ZwCOnYjVmJPaw
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exedescription pid process target process PID 268 set thread context of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe -
Processes:
39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exepid process 1076 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 1076 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 1076 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 1076 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 1076 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exedescription pid process target process PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe PID 268 wrote to memory of 1076 268 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe 39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe"C:\Users\Admin\AppData\Local\Temp\39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\39a3af53d84c612f9d396570b45322b1374adb6ce6ad5ba0430ab31e42d4fd51.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1076
-