Analysis
-
max time kernel
36s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:19
Static task
static1
Behavioral task
behavioral1
Sample
029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe
Resource
win10v2004-20221111-en
General
-
Target
029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe
-
Size
1.3MB
-
MD5
e1eb975f2a5c8127c5ecdbdfb39881f2
-
SHA1
b163a999f32bd2e1aac7c8b21f3e77aa05fd0091
-
SHA256
029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23
-
SHA512
88969a957c533393dbf392d6406d6d0f393918a047ef8edd2869c1deab427f95524fe89ae66386de8c346560f29bb3f2c04ceede82b82982a061bdc55b333777
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakm:jrKo4ZwCOnYjVmJPah
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exedescription pid process target process PID 2040 set thread context of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe -
Processes:
029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exepid process 1776 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 1776 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 1776 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 1776 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 1776 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exedescription pid process target process PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe PID 2040 wrote to memory of 1776 2040 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe 029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe"C:\Users\Admin\AppData\Local\Temp\029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\029f92d74688386ec22a122a2fba9a64c550f4fa679c31027112c3a3f8f0ee23.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1776-54-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1776-55-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1776-57-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1776-61-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1776-59-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1776-63-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1776-65-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1776-66-0x000000000044E057-mapping.dmp
-
memory/1776-68-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/1776-69-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1776-70-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1776-72-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB