Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:36
Static task
static1
Behavioral task
behavioral1
Sample
1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe
Resource
win10v2004-20220812-en
General
-
Target
1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe
-
Size
1.3MB
-
MD5
499a333bb26eb879a52309ca2c780fab
-
SHA1
a290e43d88ceb138a8a84a134b599c5a7ff79af8
-
SHA256
1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143
-
SHA512
4287cfa84c82d25074d24632ddde9e80afbf301d30de3bb00766e6e80e5fb6c9a4d9ddadf39307fbff454ad35566fe9fcb7039cf6c438f9f83ffffbfdceea414
-
SSDEEP
24576:brKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakO:brKo4ZwCOnYjVmJPa1
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exedescription pid process target process PID 2032 set thread context of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe -
Processes:
1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exepid process 864 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 864 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 864 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 864 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 864 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exedescription pid process target process PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe PID 2032 wrote to memory of 864 2032 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe 1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe"C:\Users\Admin\AppData\Local\Temp\1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\1c0df62944359bff391867e8cee63b70a8474c73d112244329f573614cbc4143.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:864