Analysis
-
max time kernel
48s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:30
Static task
static1
Behavioral task
behavioral1
Sample
9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe
Resource
win10v2004-20221111-en
General
-
Target
9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe
-
Size
1.5MB
-
MD5
68047bd1a5f1efe55bf08ef7843d2705
-
SHA1
3e5b567169262465ab8aac63cb8df130f23cb82d
-
SHA256
9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c
-
SHA512
b3e6210156dbbda360c9720c455844d2ebd9e0bb0fccd6dde92ad91d43731427a945848fb4b151756a2f7bcbc7ee1ba6380d983732273e2fc5f60a8a7b2b4ca3
-
SSDEEP
24576:lzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYx:/6/ye0PIphrp9Zuvjqa0Uid+
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exedescription pid process target process PID 1324 set thread context of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe -
Processes:
9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exepid process 956 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 956 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 956 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 956 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 956 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exedescription pid process target process PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe PID 1324 wrote to memory of 956 1324 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe 9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe"C:\Users\Admin\AppData\Local\Temp\9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe"C:\Users\Admin\AppData\Local\Temp\9f952e37b46030b453ad286f5cd1cd15cb4f9c6ccfe179f59113fa814408643c.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:956