Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe
Resource
win10v2004-20220901-en
General
-
Target
28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe
-
Size
1.3MB
-
MD5
a514088d83619eb2ce77b12b6a7d556e
-
SHA1
305b650e4b58421ed825291a6f9a22c6cd58cdbd
-
SHA256
28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21
-
SHA512
4a8a548e6dadefd49edeb099872757cd7abc7d2c035962084ef6bd941b4bd25b15aeace37ac0a192f76dbe64706354d7c69a99a33d2046877b7c2f17c8667126
-
SSDEEP
24576:2KyKz4D4ufmwhzA2QoPKCys7JdpmnMlxy9KR8uQcu9:2KVzMNuwIKyoBmnMSURNQd
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1364 set thread context of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1260 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 1260 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 1260 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 1260 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 1260 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28 PID 1364 wrote to memory of 1260 1364 28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe"C:\Users\Admin\AppData\Local\Temp\28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\28d336161f764bb016aac33ec49fea00b275c6dbc9fe5540ff5541fbcf0fdd21.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1260
-