Analysis
-
max time kernel
65s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe
Resource
win10v2004-20220812-en
General
-
Target
d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe
-
Size
123KB
-
MD5
70a213c31c0f90a3a5e815a33b789bd6
-
SHA1
127a45bc68b559ee518545f898d4a9a40ff7bbb9
-
SHA256
d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271
-
SHA512
482d98e8fde59860e8cae91ff4f4a086a30960ca43763f17b58629d15386a0f0710bf9545abc2bcb0495d5789a665cbcce0002db43e55b759843f4896c27115a
-
SSDEEP
3072:wFoxZ/SCav85bH3Huz0Gb/0htxuVsYvH51q2lYWSXLw:/F68NeL7Q6X33
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe File opened for modification C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1672 d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe 1672 d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe"C:\Users\Admin\AppData\Local\Temp\d7c94a1882c2bac9424fd6def4eebdd0a4e0043e1d6552e32e65966ba48c4271.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672