Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 15:05
Static task
static1
Behavioral task
behavioral1
Sample
9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe
Resource
win10v2004-20220812-en
General
-
Target
9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe
-
Size
104KB
-
MD5
cba3b0e6039a4f6de878975a27a6b5b8
-
SHA1
03db378b2f6556e3bd6658d14215b812c605dfa1
-
SHA256
9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36
-
SHA512
d8cd402e1c87199db5641590428532597237f3e4434556946a06afb16e1222cdc62116be8d77830001b7cafd430502b338f72d99d13ca17669658a95bd514f85
-
SSDEEP
1536:oevhl6GC5V4IVUom/HpR8fA8Ixe2+HLmrUIj:GGC5Vjaom/HpRRtxP+rmrn
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exedescription pid process target process PID 620 set thread context of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe -
Processes:
9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1584 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1584 AUDIODG.EXE Token: 33 1584 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1584 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXepid process 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 1188 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe 1188 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe 1188 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exedescription pid process target process PID 620 wrote to memory of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe PID 620 wrote to memory of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe PID 620 wrote to memory of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe PID 620 wrote to memory of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe PID 620 wrote to memory of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe PID 620 wrote to memory of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe PID 620 wrote to memory of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe PID 620 wrote to memory of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe PID 620 wrote to memory of 1188 620 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe 9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe"C:\Users\Admin\AppData\Local\Temp\9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe"C:\Users\Admin\AppData\Local\Temp\9140d596fcd958011d8bdb21cbd5089a2bf2cf038e7675dac07db5397522ed36.eXe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5401⤵
- Suspicious use of AdjustPrivilegeToken
PID:1584