Analysis
-
max time kernel
73s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:24
Static task
static1
Behavioral task
behavioral1
Sample
486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe
Resource
win10v2004-20220812-en
General
-
Target
486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe
-
Size
1.3MB
-
MD5
ccb083f68b5befb8447c94d2e91427e7
-
SHA1
385f1156472c4dad98a72f11639074774adad236
-
SHA256
486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6
-
SHA512
ee3111cb277ed198b16a8349c6e333d0c3ef16840b7daf2118058b6746dbb277a1a6b9200e6f5372ba4ef5e4b02c70bf905c57cad2ff81f47c7b3046cfce1731
-
SSDEEP
24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakR:zrKo4ZwCOnYjVmJPaa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exedescription pid process target process PID 1072 set thread context of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe -
Processes:
486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exepid process 304 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 304 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 304 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 304 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 304 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exedescription pid process target process PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe PID 1072 wrote to memory of 304 1072 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe 486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe"C:\Users\Admin\AppData\Local\Temp\486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\486c326df7e7b642efed4bfeb6eda7627b48a23916138dadc6e8b55c87d413a6.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:304
-