Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
7bd0c585c264236423abb95585c80873.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7bd0c585c264236423abb95585c80873.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
7bd0c585c264236423abb95585c80873.exe
-
Size
1.2MB
-
MD5
7bd0c585c264236423abb95585c80873
-
SHA1
cfcb4aacd474dd20da233aafc5f0f1793dc11cce
-
SHA256
14c19350ef4a4e886b1b54a33995331d2105fa2af17163a70af0fdaa6be966b7
-
SHA512
2b97d4d06125cccd43a84ecde951b2e04e3363982a103649a9b0ff3d23b0dd27981c90813cd031935bf21b04ada768ecb890270e918f0511cbfb750e65889ca9
-
SSDEEP
24576:iMdktVSlvog5hp3gzBCsX1lq7xHZB0bTcpg9ZgYejEzOWa03NHI68mO:iMdkS6IsXkRX0bQEgYe709h8
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 7bd0c585c264236423abb95585c80873.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1540 7bd0c585c264236423abb95585c80873.exe 1540 7bd0c585c264236423abb95585c80873.exe 1540 7bd0c585c264236423abb95585c80873.exe 1540 7bd0c585c264236423abb95585c80873.exe 1540 7bd0c585c264236423abb95585c80873.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28 PID 2232 wrote to memory of 1540 2232 7bd0c585c264236423abb95585c80873.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bd0c585c264236423abb95585c80873.exe"C:\Users\Admin\AppData\Local\Temp\7bd0c585c264236423abb95585c80873.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\7bd0c585c264236423abb95585c80873.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1540
-