Analysis
-
max time kernel
64s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:20
Static task
static1
Behavioral task
behavioral1
Sample
fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe
Resource
win10v2004-20221111-en
General
-
Target
fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe
-
Size
1.3MB
-
MD5
144515e30a0a88ce602de68c957ff581
-
SHA1
3c0c7c4e2886965ffadd0f44ad29d60b0b8eca21
-
SHA256
fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0
-
SHA512
cb9c44eeb80323c98d740dced12a8003ee173fc81892506c449f62adbe657c017ad5e687ec6a2bc5a758a26b92ef0bfe2287288d4c0afec4a13fb215638c6458
-
SSDEEP
24576:2KyKz4D4ufmwhzA2QoPKCys7JdpmnMlxy9KR8uQcux:2KVzMNuwIKyoBmnMSURNQR
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exedescription pid process target process PID 940 set thread context of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe -
Processes:
fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exepid process 892 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe 892 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe 892 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe 892 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe 892 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exedescription pid process target process PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe PID 940 wrote to memory of 892 940 fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe"C:\Users\Admin\AppData\Local\Temp\fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\fb6528937467921b63fcb5eee278f6f4d319a4d4f7a5d42d86187ed5d53211a0.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:892