Analysis
-
max time kernel
49s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:18
Static task
static1
Behavioral task
behavioral1
Sample
40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe
Resource
win10v2004-20220812-en
General
-
Target
40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe
-
Size
1.1MB
-
MD5
e2d787e878ceb09f951997b4a530a30d
-
SHA1
27fd85f0f3e874e0ee9a38561bf32faab5cd72ef
-
SHA256
40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d
-
SHA512
4c4df1a2475146526bba41d82ad7efbee5e904fecebe1ee45fb577f7a7f2677299728e7d4f35fcf4c9cb955ad295528941c9456efbd1092b3ee69cc853a80804
-
SSDEEP
24576:CF/QS8oTXrxf4XQjfxYE3ncjq5E8TIc4+nDCg1:CNHTtf4XkQq5E8gQ2U
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exedescription pid process target process PID 1280 set thread context of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe -
Processes:
40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exepid process 2004 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 2004 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 2004 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 2004 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 2004 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exedescription pid process target process PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe PID 1280 wrote to memory of 2004 1280 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe 40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe"C:\Users\Admin\AppData\Local\Temp\40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\40fd30c5a5a79e47f1ace8e0decb3215ab147feff6d75e006078cb81f982c28d.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-