Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 08:20
Static task
static1
Behavioral task
behavioral1
Sample
fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe
Resource
win10v2004-20221111-en
General
-
Target
fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe
-
Size
1.5MB
-
MD5
3595ff1429467433bd879cbe23673a2d
-
SHA1
be3df6a43eabcd9702cfa2a85aad59844b1b838e
-
SHA256
fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589
-
SHA512
cf84036b3bcad66dc53a1d66c3bdf566aa26c9f0835749bc6c35e242941218b56567d011323b1c3942a06cb61c37963efa32880585b3475c146b0d8ec89cc701
-
SSDEEP
24576:1zD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYU:P6/ye0PIphrp9Zuvjqa0Uid7
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exedescription pid process target process PID 1488 set thread context of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe -
Processes:
fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exepid process 1940 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe 1940 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe 1940 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe 1940 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe 1940 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exedescription pid process target process PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe PID 1488 wrote to memory of 1940 1488 fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe"C:\Users\Admin\AppData\Local\Temp\fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe"C:\Users\Admin\AppData\Local\Temp\fb3c7402815a16bf21b09ef8ec7b2c4e9d94449236f55cbe52b8d3c445620589.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940