Analysis
-
max time kernel
113s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe
Resource
win10v2004-20220812-en
General
-
Target
a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe
-
Size
1.1MB
-
MD5
085b85c934667627be36ee684f253720
-
SHA1
e727c23165fb855b348985add34794e88866b810
-
SHA256
a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4
-
SHA512
178860530f21881d7f228f33afea710d26425ea8f503599b107748fe23ad4424587cddf39b7bf24de31519a02f99e6bbaaab8ba8e2453555d8e15952ee1c16b1
-
SSDEEP
12288:MqlpSohxI/ThGvk3dHNGdgxWlrT0lB8qczfar8DCkBR6eeb3MJrs3MJrAdHqr6d:MAj3I/TMvk3dMd3Ta+QWBR60rzri
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "11000" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AdvancedOptions\BROWSE\SCRIPT_DEBUGGER\DefaultValue = "yes" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "10" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AdvancedOptions\BROWSE\SCRIPT_DEBUGGER\CheckedValue = "yes" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ACTIVEX_REPURPOSEDETECTION\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "1" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "1" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "1" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_Cross_Domain_Redirect_Mitigation a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "1" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AdvancedOptions\BROWSE\SCRIPT_DEBUGGER_IE\UncheckedValue = "no" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "1" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "1" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AdvancedOptions\BROWSE\SCRIPT_DEBUGGER\UncheckedValue = "no" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AdvancedOptions\BROWSE\SCRIPT_DEBUGGER_IE\DefaultValue = "yes" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_IMG a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "10" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AdvancedOptions\BROWSE\SCRIPT_DEBUGGER_IE\CheckedValue = "yes" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ACTIVEX_REPURPOSEDETECTION a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_IMG\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "1" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_Cross_Domain_Redirect_Mitigation\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "1" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe = "1" a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe 4624 a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe"C:\Users\Admin\AppData\Local\Temp\a4b208c5272d85fd22bd44217e23f4e91d59198efffdb43b7ae58d3d11b09ce4.exe"1⤵
- Drops file in Drivers directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4624