Analysis
-
max time kernel
151s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 04:39
Static task
static1
Behavioral task
behavioral1
Sample
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe
Resource
win10v2004-20220812-en
General
-
Target
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe
-
Size
18KB
-
MD5
78b8acb158adb4796becc24018ccd57c
-
SHA1
07e57bf5211ff0331a87768928c0f366da23aec8
-
SHA256
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1
-
SHA512
e65381f1cfef4934e16e3a7c1c813771c18f94aa1af6f5494d0f943bc79b0bb9efbc08f77c2054650397f616e12a70e31d8caaa809ad7fb7834584ae4ab2c2f6
-
SSDEEP
384:pMx/fm5ytArqyA5qELndnAKhkeEdEtUQ8zzhqVZ:uxHm5kA89tAyiEtUQ8zzhOZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe" 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exedescription pid process target process PID 1324 set thread context of 872 1324 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe -
Processes:
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exepid process 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exepid process 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 872 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exedescription pid process target process PID 1324 wrote to memory of 872 1324 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe PID 1324 wrote to memory of 872 1324 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe PID 1324 wrote to memory of 872 1324 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe PID 1324 wrote to memory of 872 1324 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe PID 1324 wrote to memory of 872 1324 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe PID 1324 wrote to memory of 872 1324 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe PID 1324 wrote to memory of 872 1324 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe 14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe"C:\Users\Admin\AppData\Local\Temp\14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe"C:\Users\Admin\AppData\Local\Temp\14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe"2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/872-54-0x0000000000400000-0x0000000000404000-memory.dmpFilesize
16KB
-
memory/872-55-0x0000000000400000-0x0000000000404000-memory.dmpFilesize
16KB
-
memory/872-57-0x0000000000400000-0x0000000000404000-memory.dmpFilesize
16KB
-
memory/872-58-0x0000000000400000-0x0000000000404000-memory.dmpFilesize
16KB
-
memory/872-59-0x0000000000402040-mapping.dmp
-
memory/872-61-0x0000000000400000-0x0000000000404000-memory.dmpFilesize
16KB
-
memory/872-62-0x0000000000400000-0x0000000000404000-memory.dmpFilesize
16KB
-
memory/872-63-0x0000000075F81000-0x0000000075F83000-memory.dmpFilesize
8KB
-
memory/872-72-0x0000000000400000-0x0000000000404000-memory.dmpFilesize
16KB