Analysis
-
max time kernel
62s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe.exe
Resource
win10v2004-20220901-en
General
-
Target
1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe.exe
-
Size
153KB
-
MD5
78dfd34a8c53b4bfa8ca09ee29b22581
-
SHA1
2dada394b53e3d6089d01a9ba054e750d132e3db
-
SHA256
1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe
-
SHA512
33f0c3677a9fe4a4d0c3838469e713647f5cd9b0934fd8ebdc7bdd3b99d779268827bb7758d9864057139203891ff7650491c4d01fd0c6fe13f30cf5d0640c20
-
SSDEEP
3072:OQbuO1AU2Oejqg8hEhTCI6t8TlXofGPo9St8WHxSD+09+S:Oou5+eOV+hG/tO9f8CA0S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1412 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1412 explorer.exe Token: SeCreatePagefilePrivilege 1412 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe.exe"C:\Users\Admin\AppData\Local\Temp\1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe.exe"1⤵PID:3096
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2460
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1412