Analysis
-
max time kernel
32s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 19:25
Static task
static1
Behavioral task
behavioral1
Sample
80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe
Resource
win10v2004-20220812-en
General
-
Target
80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe
-
Size
1.6MB
-
MD5
2177212bd7b176dd427cfb8bf9735650
-
SHA1
2cb6ba2417d727c1c70149c69be34c053dc38226
-
SHA256
80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d
-
SHA512
76521e44b2c083e7762cb90df7dbee30fd34ec6d3ceb325f36738442d6869191965a908fb7b8ba7f365c564b8c3bbff015ee254d62f2312bc11515d90efed502
-
SSDEEP
24576:9zD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYo:X6/ye0PIphrp9Zuvjqa0Uidn
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exedescription pid process target process PID 1448 set thread context of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe -
Processes:
80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exepid process 316 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 316 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 316 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 316 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 316 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exedescription pid process target process PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe PID 1448 wrote to memory of 316 1448 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe 80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe"C:\Users\Admin\AppData\Local\Temp\80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe"C:\Users\Admin\AppData\Local\Temp\80db2900e2bb6725ffad9b82b3fd766c29f1fff44a09658f84ddf14e87b62d7d.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:316
-