Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe
Resource
win10v2004-20220812-en
General
-
Target
4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe
-
Size
1.1MB
-
MD5
94a7bda581b9150eeef539f937a06311
-
SHA1
6af409df1353288293c675f7e9a3953a70aa678d
-
SHA256
4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610
-
SHA512
09c17e6587be963060f64fc94f9c7b24de933ff19279e51b422ea2948a01a5b3ff49786c2d6119141836106a1bfcb3ec88657e838641dc4c736598de2650fdaa
-
SSDEEP
24576:4tb20pkaCqT5TBWgNQ7aPQ8P/FOwByW+CsOz6AG:BVg5tQ7aPpP/FkW75G
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe = "11001" 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3152 wrote to memory of 3296 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe 83 PID 3152 wrote to memory of 3296 3152 4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe 83 PID 3296 wrote to memory of 3176 3296 cmd.exe 85 PID 3296 wrote to memory of 3176 3296 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe"C:\Users\Admin\AppData\Local\Temp\4716021807d6e2d77455c0cff822de2d5a83bee501b4ebb3c827577ecb953610.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\cscript.exe "C:\Users\Admin\AppData\Local\Temp\install.wsf" /type:preInstall2⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\system32\cscript.exeC:\Windows\system32\cscript.exe "C:\Users\Admin\AppData\Local\Temp\install.wsf" /type:preInstall3⤵PID:3176
-
-