Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 23:10
Static task
static1
Behavioral task
behavioral1
Sample
75c18daa0816a2f13cfa541c76d60419.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
75c18daa0816a2f13cfa541c76d60419.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
75c18daa0816a2f13cfa541c76d60419.exe
-
Size
1.3MB
-
MD5
75c18daa0816a2f13cfa541c76d60419
-
SHA1
0b2dd4456e27cdf36a70e85a0e950c9f02a59cb9
-
SHA256
1679163090880d15beca42e7268483fee800b7dd9f8fe743872d47b79d62c10f
-
SHA512
62ab5b16b15ee15d4fb959557ac91dea7aabdf0870e2cff87c3b00739f34fc85f9653539583ef119c221a0c36e537f979edb50ca17706633ac730c3b612763c3
-
SSDEEP
24576:/rKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPakT:/rKo4ZwCOnYjVmJPa8
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1752 set thread context of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 75c18daa0816a2f13cfa541c76d60419.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2544 75c18daa0816a2f13cfa541c76d60419.exe 2544 75c18daa0816a2f13cfa541c76d60419.exe 2544 75c18daa0816a2f13cfa541c76d60419.exe 2544 75c18daa0816a2f13cfa541c76d60419.exe 2544 75c18daa0816a2f13cfa541c76d60419.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28 PID 1752 wrote to memory of 2544 1752 75c18daa0816a2f13cfa541c76d60419.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\75c18daa0816a2f13cfa541c76d60419.exe"C:\Users\Admin\AppData\Local\Temp\75c18daa0816a2f13cfa541c76d60419.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\75c18daa0816a2f13cfa541c76d60419.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-