Analysis
-
max time kernel
151s -
max time network
136s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
14-01-2022 07:01
Static task
static1
Behavioral task
behavioral1
Sample
qaz.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
qaz.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
qaz.exe
-
Size
489KB
-
MD5
8f7205aaf80ce4b5d0ee8f00369f301a
-
SHA1
401d3336eb33cf82eecb5df5c2ac6d5f7f78aa26
-
SHA256
655ca39beb2413803af099879401e6d634942a169d2f57eb30f96154a78b2ad5
-
SHA512
1de8e8e3e4e8356067365571e90a812425ef18da2b7c210656f79683d41d3943e7fd052160978e370952afe8b14555a51871bd2c3923294c5057a8bb6d82b47d
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6285B2A3-7763-11EC-9231-EAE77BAD686B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2918335329" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004570a1b208d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8db62ff13956941acf514a4778508d700000000020000000000106600000001000020000000c6229e0510032cd8bd9059dd4671f399996a3232115b66dbae027afde5396457000000000e80000000020000200000007aaa3a44c5df76d23510e73e408ae4e7998a2209caa7264b6f591a144e88200720000000aab2f72f0206c6c57647286c2a259179e95bc39617d725b81e9f3619b776523a400000005a08c48e66331819f674cafc5fea0ac7fabfea9e02fec698327f2155447fdb0a03f71dad43529393f99014a3c2cfa4bbde1d102a76336bc8d59a5eee483aae7c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8db62ff13956941acf514a4778508d700000000020000000000106600000001000020000000f776deee69593a377a15eff240b0e10e0fa1e58fa086c06e6299cdb6ba73b8c4000000000e80000000020000200000000ef40d5170185cbef2ee0ffe25771a49c89e03106d2ffbacec6dadf3957210fe200000008e2f00d11136e35c446100300dff286958fb5084633cd57236ff7a1dc2e3969f40000000e10cbe317851b59ee5e4dc3f9b3e62771df43c7e030c18259c7e5ba6c2931d275a01bbbdc634eae3c024783e890e2fe9cf1a1af08005b8cd3adbd1ed2fe67442 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106a3b9cb208d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103b5da9b208d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30935218" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2918335329" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8db62ff13956941acf514a4778508d700000000020000000000106600000001000020000000da741e1bd68af42955df27a2c480480441d46c7f77d01b7419304192ee549994000000000e8000000002000020000000ba84df01101878257596aef08bc4634505a02b16fa1120885ea677a1bffcaac020000000bb4d7809560d22355f65dbaeb269ea2828d8109c626353ec22f0538c79e53f1d40000000f3f8343666febf0b6a108cf6775739269f8db50c74efa6a74be245643ce48b600e5e0866af774abc23c52898b7c7504ba12929881f15c304fc6ed5cb4a57f012 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30935218" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2732 iexplore.exe 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2224 qaz.exe 2732 iexplore.exe 2732 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 2732 iexplore.exe 2732 iexplore.exe 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 2732 iexplore.exe 2732 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 2732 iexplore.exe 2732 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2732 wrote to memory of 848 2732 iexplore.exe 69 PID 2732 wrote to memory of 848 2732 iexplore.exe 69 PID 2732 wrote to memory of 848 2732 iexplore.exe 69 PID 2732 wrote to memory of 1268 2732 iexplore.exe 71 PID 2732 wrote to memory of 1268 2732 iexplore.exe 71 PID 2732 wrote to memory of 1268 2732 iexplore.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\qaz.exe"C:\Users\Admin\AppData\Local\Temp\qaz.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2224
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:848
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:82948 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1268
-