Analysis
-
max time kernel
25s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 01:52
Static task
static1
Behavioral task
behavioral1
Sample
388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe
Resource
win10v2004-20221111-en
General
-
Target
388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe
-
Size
1.3MB
-
MD5
272e62c63f66d6003eda456c5b5ba00e
-
SHA1
f60fc98710e833cc427c41b0326c81d4aca2317a
-
SHA256
388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92
-
SHA512
c015b6b41d9c3f0562b99973a5463a7ff199eda3c77ecfbae7904b03194feb53805d6a1f12da00b446fd33648be32fd61d20ce646e57ee2086b7d9aa83ec29dc
-
SSDEEP
24576:rrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak:rrKo4ZwCOnYjVmJPa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exedescription pid process target process PID 684 set thread context of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe -
Processes:
388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exepid process 268 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 268 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 268 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 268 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 268 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exedescription pid process target process PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe PID 684 wrote to memory of 268 684 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe 388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe"C:\Users\Admin\AppData\Local\Temp\388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\388a2e85e6e5b062f6fb57dc1e7ebf2781f52d93d0ffade13c082f0167c69e92.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:268