Analysis
-
max time kernel
138s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 22:10
Static task
static1
Behavioral task
behavioral1
Sample
f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe
Resource
win10v2004-20220812-en
General
-
Target
f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe
-
Size
164KB
-
MD5
46730f4cd22bece8d1a665aca854d87c
-
SHA1
dbe950b37f5ae9297e29efe246f7d8ffcbd8e658
-
SHA256
f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb
-
SHA512
f7060bc4717a4e8cc626035e2552ff914bfdd1bed831de4c05f3fd8ee68c6a1398a230b9333c4815f88f330808bdd014143b8cf8f219980291feb1d37efcaf6a
-
SSDEEP
3072:0GCEVcg5/OlPmsIP99MwSlakHnOB/eBkuSFDth3yFDvnLhavr5:0YVcdm3P99CHHymKuSdDyRLhaV
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4916 set thread context of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987999" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2093498173" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2093498173" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30987999" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371535778" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A6A80449-42D2-11ED-89AC-DAE60F07E07D} = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1952 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe 1952 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe 1952 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4836 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1952 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe Token: SeDebugPrivilege 4180 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4836 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 4836 IEXPLORE.EXE 4836 IEXPLORE.EXE 4180 IEXPLORE.EXE 4180 IEXPLORE.EXE 4180 IEXPLORE.EXE 4180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4916 wrote to memory of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 PID 4916 wrote to memory of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 PID 4916 wrote to memory of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 PID 4916 wrote to memory of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 PID 4916 wrote to memory of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 PID 4916 wrote to memory of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 PID 4916 wrote to memory of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 PID 4916 wrote to memory of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 PID 4916 wrote to memory of 1952 4916 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe 82 PID 1952 wrote to memory of 3380 1952 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe 85 PID 1952 wrote to memory of 3380 1952 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe 85 PID 1952 wrote to memory of 3380 1952 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe 85 PID 3380 wrote to memory of 4836 3380 iexplore.exe 86 PID 3380 wrote to memory of 4836 3380 iexplore.exe 86 PID 4836 wrote to memory of 4180 4836 IEXPLORE.EXE 87 PID 4836 wrote to memory of 4180 4836 IEXPLORE.EXE 87 PID 4836 wrote to memory of 4180 4836 IEXPLORE.EXE 87 PID 1952 wrote to memory of 4180 1952 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe 87 PID 1952 wrote to memory of 4180 1952 f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe"C:\Users\Admin\AppData\Local\Temp\f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe"C:\Users\Admin\AppData\Local\Temp\f0f6af4a53c3197aeeb33ea1b30fdee4d6829ffdfce0d9d634a82e0b1e161edb.eXe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4836 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4180
-
-
-
-