Analysis
-
max time kernel
176s -
max time network
249s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:44
Static task
static1
Behavioral task
behavioral1
Sample
89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe
Resource
win10v2004-20220812-en
General
-
Target
89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe
-
Size
1.5MB
-
MD5
caf6c5d55c933e5cf5f320c3de74d087
-
SHA1
99c65d4d0fff3b708292b63af642ce263ba95aba
-
SHA256
89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94
-
SHA512
3519e875c6d7248edd4c5a55f2d86359e9da1b1b0ca6e3e100878a1495993eb68d7031f0ccd5c4a764cbd0fee09435959db1b7e434cc3f13833a55d7559f5104
-
SSDEEP
24576:S5IM/V0deM5lZ2ykPYMkrQ1OrWaRyv2PBcSL+L5/+FMoQl/ugQWiBdrfO+a+l:YIBfvMkrNrf0u3qdaNLgQWiO+F
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exedescription pid process target process PID 1224 set thread context of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe -
Processes:
89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exepid process 336 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 336 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 336 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 336 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 336 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exedescription pid process target process PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe PID 1224 wrote to memory of 336 1224 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe 89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe"C:\Users\Admin\AppData\Local\Temp\89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\89a8f8204f681dd17ece3ac7c9a4a86d3a72741b5e438aa380ebec892c4cff94.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:336