Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe
Resource
win10v2004-20220901-en
General
-
Target
fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe
-
Size
304KB
-
MD5
5bb4e9033056fe191c2453bff998a890
-
SHA1
66f7278719281286b62fef247f1aa4cdbd8b4465
-
SHA256
fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2
-
SHA512
0eb3b065c4b2453d52df4693859fd1bef3be5ca6c45f36f34035d4d32a4fcf5e5c0df8dc9220853597413b61f9dfc0ba29d8da75968cd71a42127a704fbc5472
-
SSDEEP
6144:dDBqcP7jtGVxqHWvIuym6L/YjuC5vLeifqDx7lSl4HMKFsX:nqoxyqwyPC5vLeiC17lDRq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: 33 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe Token: SeIncBasePriorityPrivilege 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe 1324 fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe"C:\Users\Admin\AppData\Local\Temp\fef1b3d4dae7262f3ee28a1f2cc0b9d2784417d9ffb346d7762a9011b2d8eca2.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1324