Analysis
-
max time kernel
9s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe
Resource
win10v2004-20220812-en
General
-
Target
2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe
-
Size
84KB
-
MD5
0ed4e626aa003567f46f720990409590
-
SHA1
99b196b2bd36a67b08baecfc60a9d69d1234ff06
-
SHA256
2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25
-
SHA512
a776d0cfcc10b7fbdce86cebe38727c172bebf151288a233fe30d73da4c2d9bda9a81249e17a62929c4b752e720ebccaa5bba9970a4aeb05df793661699cdf65
-
SSDEEP
768:e3ncJu5hBXF2pmiq2V41xNmAFgGyi4XwP13GT9W28z/zMp5xAFiE3s:e3cJu5hBVWq2kN6LXwPVGT9lgA5gs
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40 PID 4424 wrote to memory of 740 4424 2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe"C:\Users\Admin\AppData\Local\Temp\2cf6dea19e814043b2f697f24d60fbb63a6d4824a460b3153cb8e4afcd5c9f25.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:740