Analysis
-
max time kernel
125s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 01:50
Static task
static1
Behavioral task
behavioral1
Sample
1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe
Resource
win10v2004-20220812-en
General
-
Target
1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe
-
Size
461KB
-
MD5
753afac3dea2ca0dd82f0ec7c111b766
-
SHA1
abedcea102839ec45b7be56f647e585ab2b699ce
-
SHA256
1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12
-
SHA512
753df448c9aa6a32744b54df90fc1aea3896e4c23aa167991a67fcdecef13029323fb4eb2ef4b96aa5a5d0c1517878d05608397d4f44fcba7bbe7f4eac8006a3
-
SSDEEP
12288:9bzxG09kRLS0CQE83xYygA+PaAN8qnlNgKPKiYWc:93A5RLxEry9+iAmiDgKKiA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1C1E736A-5129-11ED-B696-D2371B4A40BE} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10891ff235e5d801 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b14216000000000200000000001066000000010000200000004966bfa6b9aed3cacdb8cc22dfe4f37d88131c3b9c3e941727cded0c3eb29331000000000e8000000002000020000000fd819d1f6781b5d377af7f03e696a8ee333b1fe61cb3846090ee7ad1c0ff0a2b2000000052a8aa6fd6ac9318316eee0551cecb580dc366c0f0dbb910cdff09cf1fa8784240000000165b999e5a8dd2825601d7c20a928d26238396fdac9b0e3216b3c6664ba86563aa65b0f97472050f4447ce6665f20b302c88f7ec601dc509daff9c3a25b5b227 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708329f735e5d801 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373112261" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b1421600000000020000000000106600000001000020000000733d3b70f4a60476608ccd7465a2e92b558431fe5f36cc7e587c1c9be2168c58000000000e8000000002000020000000cc18c8a8cd6aed2c039236fd216fea23e91ab397c72d4ddcad7634713f252dbe200000009655b62bf501dbbff60dc41def820de7a902edc0d513383148daf1b96956b27540000000a712ecdfaeeacebcf73b4befbe469802e6fd5c71b61b9d7d19ea8a02d5c855ba0682aed5d3ce216fddbd2ef79cb65aa2cd2b6221c58559b0d0ce4c3f318241f2 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2680 1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2680 1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 4944 IEXPLORE.EXE 4944 IEXPLORE.EXE 4944 IEXPLORE.EXE 4944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1548 2680 1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe 82 PID 2680 wrote to memory of 1548 2680 1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe 82 PID 1548 wrote to memory of 4944 1548 IEXPLORE.EXE 83 PID 1548 wrote to memory of 4944 1548 IEXPLORE.EXE 83 PID 1548 wrote to memory of 4944 1548 IEXPLORE.EXE 83 PID 2680 wrote to memory of 1424 2680 1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe 84 PID 2680 wrote to memory of 1424 2680 1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe 84 PID 2680 wrote to memory of 1424 2680 1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe"C:\Users\Admin\AppData\Local\Temp\1bac4e791fdd6ddf0ff507c49a77cc25f32d215e35e2ac8244b442079dde4d12.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.wa300.com/tj.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\1BAC4E~1.EXE2⤵PID:1424
-