Analysis
-
max time kernel
142s -
max time network
143s -
resource
win7v191014
Task
task1
Sample
222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe
Resource
win7v191014
0 signatures
Task
task2
Sample
222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe
Resource
win10v191014
0 signatures
General
-
Target
222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9
-
Sample
191025-w35pvd2lbx
-
SHA256
222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9
Score
N/A
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe Token: SeTakeOwnershipPrivilege 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe Token: SeBackupPrivilege 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe Token: SeRestorePrivilege 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe Token: SeBackupPrivilege 1844 vssvc.exe Token: SeRestorePrivilege 1844 vssvc.exe Token: SeAuditPrivilege 1844 vssvc.exe -
Modifies control panel 2 IoCs
Processes:
222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exedescription ioc pid Process Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Control Panel\Desktop\WallpaperStyle = "0" 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Control Panel\Desktop\TileWallpaper = "0" 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exeiexplore.exedescription pid Process procid_target PID 1468 wrote to memory of 2044 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe 30 PID 2044 wrote to memory of 268 2044 iexplore.exe 33 PID 1468 wrote to memory of 2012 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe 34 -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
iexplore.execonhost.exeIEXPLORE.EXEpid Process 2044 iexplore.exe 576 conhost.exe 268 IEXPLORE.EXE -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2012 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeDllHost.exepid Process 2044 iexplore.exe 1852 DllHost.exe -
Processes:
222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exedescription ioc pid Process File opened for modification \??\c:\Users\Admin\Documents\ConvertSubmit.xls 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Desktop\DisableReceive.ppt 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\PopRevoke.potx 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\UnblockUnprotect.xlsx 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Music\ApproveTest.xlt 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Music\LimitGet.xlt 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Desktop\StopUnregister.docx 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\Are.docx 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\Files.docx 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\Opened.docx 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\Recently.docx 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\These.docx 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\WaitSelect.dotm 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Music\MeasureSearch.xltm 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Music\RemoveOut.pot 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Music\RestoreConvertTo.xltm 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\LimitRead.ppt 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\SplitAssert.xls 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\UninstallClear.ppsm 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe File opened for modification \??\c:\Users\Admin\Documents\ExportPush.dotx 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exedescription ioc pid Process Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" 1468 222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc pid Process Set value (int) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" 2044 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69966541-F727-11E9-9705-DEEA98545C14} = "0" 2044 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 2044 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" 2044 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 2044 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" 2044 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 268 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" 2044 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009aa4f4faf1a8e341b8de4356d522d0ee0000000002000000000010660000000100002000000094fbf16c59fa4ac947ca085efbf39274f20ebb8a16c175b62dae5255f39860ee000000000e800000000200002000000029c65f94dbd7cdb6e2dcffa01d479418ce120163ef85038899f3cf9a8d6db92220000000df1fa7e1b50863f3c388748038171ccf289d9af2145a40a3575ec8a0020adfe0400000001fd8b9938e26f2eaac21efbbe554446801b80cc6a1d595a3420947136b8eda27af116e80fc3c8012fc47b2862b20b1a54ddb7bef27d0afc5aa1ccffc5784227f 2044 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0352441348bd501 2044 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 2044 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" 2044 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1774239815-1814403401-2200974991-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "278773402" 2044 iexplore.exe -
Drops file in system dir 1 IoCs
Processes:
DllHost.exedescription ioc pid Process File opened for modification C:\Windows\SysWOW64\GDIPFONTCACHEV1.DAT 1852 DllHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe"C:\Users\Admin\AppData\Local\Temp\222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies control panel
- Suspicious use of WriteProcessMemory
- Drops Office document
- Sets desktop wallpaper using registry
PID:1468
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
C:\Windows\system32\taskeng.exetaskeng.exe {08E52B89-F93E-44D6-B791-F2B294F9AA76} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2016
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ykcol.htm1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
- Suspicious use of FindShellTrayWindow
- Modifies Internet Explorer settings
PID:2044
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
- Drops file in system dir
PID:1852
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:21⤵
- Suspicious use of SetWindowsHookEx
- Modifies Internet Explorer settings
PID:268
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\222b2b80b21db2584d9cb51082f7eadf0bbf04bb2a555ef850391d62dd68d5d9.exe"1⤵
- Deletes itself
PID:2012
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1010190574-19306643031201772696-479661271629380329-88839335-56182350-1854666663"1⤵
- Suspicious use of SetWindowsHookEx
PID:576