Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 05:20
Static task
static1
Behavioral task
behavioral1
Sample
226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe
-
Size
187KB
-
MD5
23e26f6748b07db1b464f5d237917282
-
SHA1
3a27db2d1ac8a8fc30d972f4b9d7f91e99d7f96f
-
SHA256
226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b
-
SHA512
53e86805989a7a18964cb44ea514d1728a97931979bdbc991011a5a88fa8a49564f1bffb59ca061666cae37eb020e87c00c9d4361c2c5fb4f696f418e5ca7d53
Malware Config
Extracted
Family
gootkit
Botnet
2855
C2
me.jmitchelldayton.com
otnhmtkwodm1.site
Attributes
-
vendor_id
2855
Signatures
-
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exepid process 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exedescription pid process target process PID 1604 wrote to memory of 4352 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe PID 1604 wrote to memory of 4352 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe PID 1604 wrote to memory of 4352 1604 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe 226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe"C:\Users\Admin\AppData\Local\Temp\226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe"1⤵
- Modifies Internet Explorer Protected Mode
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exeC:\Users\Admin\AppData\Local\Temp\226792baf638fbc82be1396e926e06a6d3570f6f8b5bf14439fee0ee5af5bd9b.exe --vwxyz2⤵PID:4352
-