Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 05:12
Static task
static1
Behavioral task
behavioral1
Sample
e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe
Resource
win10v2004-20221111-en
General
-
Target
e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe
-
Size
1.3MB
-
MD5
8d18122beb45eab981072eefd0993f55
-
SHA1
377cd7e173e05d68cfd5394b317877c176e09af9
-
SHA256
e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656
-
SHA512
272f2664dd500b7a06ca21b6ef3435ef235796bd6be350296bb21e43c8f3fb42a453c8a307efe200388bbfe741cc09fbc711a7bc20d65b91aaf30d7ba21e3281
-
SSDEEP
24576:DXO93poEu4pCkao1bNQfSyNGXTYGwwKCWiBe+I351KDsTXY8vZ6QeQA:DMZoANNbyNGjW8u5MsTXY8vffA
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1444 set thread context of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1948 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 1948 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 1948 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 1948 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 1948 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27 PID 1444 wrote to memory of 1948 1444 e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe"C:\Users\Admin\AppData\Local\Temp\e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\e4db4c7222a3c921291dbc25825bd2f47c42c21ac800a592c0c039e48bb5f656.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1948
-