Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe
Resource
win10v2004-20220812-en
General
-
Target
fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe
-
Size
449KB
-
MD5
062c1c136649b1d6c191a86710fccc2c
-
SHA1
7e6bbc7bac6ac63e01c28910f338c1fc481e06fc
-
SHA256
fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d
-
SHA512
03d7c5607129428364875faa1adab0b44c214c9541e63184912b2a42467290fae6a515b3c0648784cf3f6f77a18eac67d6fe2a859a582293db4b63c00d7a2378
-
SSDEEP
12288:q0+GxSV74cwpgpJq3m6qkdKEFOwrv7m+ed/f05wCDPSdptRlJFn:pxe8c8gp43NdZLref05wrfRlP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6C4DA20C-5DF8-11ED-89AC-E62BBF623C53} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000975fab978604b14697eb522259e91a10000000000200000000001066000000010000200000006bc4d81c0eed17dc33a1fb8fcd3b2f4b41f6d3a0cb528d1e77fa8041f7a1c3ab000000000e8000000002000020000000cfff56fd1f66a8e0d60209182c60a2bdbbe30f38984f204ac0dcfb1f8ffcf32920000000e9f178a5176d3c83c481a778c64060a6326f3382d50e9405a1d2e470ef44a74b400000003169b15a5d8cb116804665e9150e2ea22a25afd376eac0c9a64522dc8a1328d5c25fba827ea380ec5473623a2862879e215f751d3e349fd1500c53a9f89cf741 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cd734e05f2d801 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ce2d4f05f2d801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000975fab978604b14697eb522259e91a10000000000200000000001066000000010000200000006af4aec18161730f5995f5358d8309f19293cd197ca16be215c7f7a40de5c44a000000000e80000000020000200000001406f507790d1f2e56da3c131df2e844d04b9cfe696f95437d3449e20b7f9f79200000000d3f234f559db758caf8a05fdbd9fdf9ef1533b1715f4a0deb6b191b59003caa400000008851f3af89c8f59324272fd352fd4f3c78fa2eb00be0ca7113d46e9d48d44eec4f615c5829600517ac6f207ea531ff3035df324605a3d1cffe9a258b2d3ce6c4 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374520684" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1532 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4708 fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4708 fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4708 wrote to memory of 1532 4708 fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe 81 PID 4708 wrote to memory of 1532 4708 fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe 81 PID 1532 wrote to memory of 2868 1532 IEXPLORE.EXE 82 PID 1532 wrote to memory of 2868 1532 IEXPLORE.EXE 82 PID 1532 wrote to memory of 2868 1532 IEXPLORE.EXE 82 PID 4708 wrote to memory of 4812 4708 fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe 83 PID 4708 wrote to memory of 4812 4708 fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe 83 PID 4708 wrote to memory of 4812 4708 fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe"C:\Users\Admin\AppData\Local\Temp\fc4120d34aae33598727d717db0c95c5e49874bd78ff337f02dad872ddb0749d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.wa300.com/tj.html2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\FC4120~1.EXE2⤵PID:4812
-