Analysis
-
max time kernel
66s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe
Resource
win10v2004-20220901-en
General
-
Target
209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe
-
Size
1.2MB
-
MD5
ca2233e2f71a99357df0540a44a04b48
-
SHA1
f23233ff0b4800b306bce5587aa8367c77fc7dfb
-
SHA256
209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc
-
SHA512
42db43adc01b167cf6e6539cb6df7653a4c3d368a574804904183b310c2fe38c388e89798bc1dbead3c3e215067b030a30e551625f9ce0ebef1423a2ab42bb91
-
SSDEEP
24576:J8Ax9GLS59Q2SQUVqyeFtBJepApojDkfW/1RJMGdmXX:h955i2S5VFIBJewerJMkmH
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1088 set thread context of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1056 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 1056 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 1056 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 1056 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 1056 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26 PID 1088 wrote to memory of 1056 1088 209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe"C:\Users\Admin\AppData\Local\Temp\209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\209d818647c31c7735d8c4fe5cf46bf5e19741b4ee3e470f363612683690dccc.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1056
-