Analysis
-
max time kernel
21s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 11:55
Static task
static1
Behavioral task
behavioral1
Sample
d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe
Resource
win10v2004-20221111-en
General
-
Target
d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe
-
Size
1.2MB
-
MD5
b2c66a5d5431b9ea7215ca9c3dcf7b78
-
SHA1
5f8da1a54e684afaddc0213c84f1191a769ea546
-
SHA256
d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514
-
SHA512
18358a9361434b37f2192cc41827672c19a35a286673ac8246de03c1a668f448fbd8683b7f06af329a3c065c7f20c03638e4eb0e1a81f74f8082c633707ab8ba
-
SSDEEP
12288:dSGxzDKw6w2qa3LgMc8SLFDY/8LeS2899E7D3AYNACMzb7noKcxl4B6obXWRAfby:cxw8wFDY3wE3wY6cxI6gWUbIwMLHf/
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exedescription pid process target process PID 1792 set thread context of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe -
Processes:
d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exepid process 1116 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe 1116 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe 1116 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe 1116 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe 1116 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exedescription pid process target process PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe PID 1792 wrote to memory of 1116 1792 d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe"C:\Users\Admin\AppData\Local\Temp\d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe"C:\Users\Admin\AppData\Local\Temp\d44b236799b4245c548aacca4a6c3bed19cb7f6e76cebdc60869d882951f0514.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1116