Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09/10/2022, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe
Resource
win10v2004-20220812-en
General
-
Target
34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe
-
Size
68KB
-
MD5
fe9a9c43db208755465640bfb055d819
-
SHA1
f1fcb5767bf51d87957f2038c2021992014ba0d0
-
SHA256
34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9
-
SHA512
4f89d7caec69ce9f86c13e6e3bed676ac26eb64d8b2051593a7e1bc2d3e48462162a7bac3a691723e95105fd1dfd390c3627c13f845f6d202ad228e6fa0d791a
-
SSDEEP
384:/TVGq1Of9ZJCACQyuRK+0v6mD+WVWphiQwnSeKNGNO3phqVEuRK+0v6mD+hCQOJa:/xGiu9a4RdWO0RhNmqXRdBgGiu9
Malware Config
Signatures
-
Kills process with taskkill 1 IoCs
pid Process 1960 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RunDll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RunDll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1960 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 936 RunDll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1960 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 28 PID 1980 wrote to memory of 1960 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 28 PID 1980 wrote to memory of 1960 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 28 PID 1980 wrote to memory of 1960 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 28 PID 1980 wrote to memory of 936 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 29 PID 1980 wrote to memory of 936 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 29 PID 1980 wrote to memory of 936 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 29 PID 1980 wrote to memory of 936 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 29 PID 1980 wrote to memory of 936 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 29 PID 1980 wrote to memory of 936 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 29 PID 1980 wrote to memory of 936 1980 34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe"C:\Users\Admin\AppData\Local\Temp\34819b154426043cb9c0a3d002c686eb2723001e1199db8605d6de4a83e265b9.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 支付宝免签约即时到帐辅助.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 82⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:936
-