Analysis
-
max time kernel
82s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe
Resource
win10v2004-20220812-en
General
-
Target
99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe
-
Size
6.0MB
-
MD5
9bb523bdcebcf0c6e6cb9553e838229b
-
SHA1
6e1c4b8c7fdb7ef242196b9b8685dbfa296e614b
-
SHA256
99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92
-
SHA512
d00ffc1f403c55a89f327b2cf761e39576f33eabe1921e08f8797f8ae107af29e62aa7c03dcae09bb5a777b7545054934f728e40885c3e589f4b274b80c7d030
-
SSDEEP
98304:q3uxXKIEZcX3ecaTvhT4c0iC9vy6KGiZIb2J8UGK7j6fMQrxQFePokF18yX:qZtuZaTvi99qGiZI4H6f5rxFoK1BX
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\NWG.dat 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe File opened for modification C:\Windows\SysWOW64\NWG.dat 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 952 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 1484 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 952 set thread context of 1484 952 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1484 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1484 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 1484 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 1484 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 1484 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 952 wrote to memory of 1484 952 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 28 PID 952 wrote to memory of 1484 952 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 28 PID 952 wrote to memory of 1484 952 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 28 PID 952 wrote to memory of 1484 952 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 28 PID 952 wrote to memory of 1484 952 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 28 PID 952 wrote to memory of 1484 952 99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe"C:\Users\Admin\AppData\Local\Temp\99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exeC:\Users\Admin\AppData\Local\Temp\99145745d04cd79bb30b565391fb9cd5a8bd678dfb291ba8663781c821a83c92.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1484
-