Analysis
-
max time kernel
162s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:31
Static task
static1
Behavioral task
behavioral1
Sample
62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe
Resource
win10v2004-20221111-en
General
-
Target
62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe
-
Size
82KB
-
MD5
391f2a8bd9f95e0bdfd8ef23386e4f07
-
SHA1
f8ffa4f4aefcf0556e2d1d882aec561820eb9c5f
-
SHA256
62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd
-
SHA512
5cb258c59b5cd2bcd8bb571277690eace25301816c1227efa87712a92f0acf8b704c3cee78a0e699623f71561029cf2eb56fb809bb458cef4868a585c48b5d26
-
SSDEEP
1536:iCxLLuMfyI3G+0c2ySZ4PrW/goiCnsBrgn7i3UCVFs9K8RUCRePyBbYa5ewxt:iqLLuz+0ISZ4PyggsBcnu3hVehHBbYaF
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4968 3212 WerFault.exe IEXPLORE.EXE -
Processes:
IEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "79883843" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375990776" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998372" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "79883843" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998372" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2E5D8B35-6B57-11ED-919F-42A3CC74B480} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exepid process 4992 62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe 4992 62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe 4992 62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exedescription pid process Token: SeDebugPrivilege 4992 62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 1152 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 3212 IEXPLORE.EXE 3212 IEXPLORE.EXE 3300 IEXPLORE.EXE 3300 IEXPLORE.EXE 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE 5112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exeiexplore.exeIEXPLORE.EXEdescription pid process target process PID 4992 wrote to memory of 4604 4992 62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe iexplore.exe PID 4992 wrote to memory of 4604 4992 62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe iexplore.exe PID 4992 wrote to memory of 4604 4992 62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe iexplore.exe PID 4604 wrote to memory of 1152 4604 iexplore.exe IEXPLORE.EXE PID 4604 wrote to memory of 1152 4604 iexplore.exe IEXPLORE.EXE PID 1152 wrote to memory of 3212 1152 IEXPLORE.EXE IEXPLORE.EXE PID 1152 wrote to memory of 3212 1152 IEXPLORE.EXE IEXPLORE.EXE PID 1152 wrote to memory of 3212 1152 IEXPLORE.EXE IEXPLORE.EXE PID 4992 wrote to memory of 3212 4992 62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe IEXPLORE.EXE PID 4992 wrote to memory of 3212 4992 62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe IEXPLORE.EXE PID 1152 wrote to memory of 5112 1152 IEXPLORE.EXE IEXPLORE.EXE PID 1152 wrote to memory of 5112 1152 IEXPLORE.EXE IEXPLORE.EXE PID 1152 wrote to memory of 5112 1152 IEXPLORE.EXE IEXPLORE.EXE PID 1152 wrote to memory of 3300 1152 IEXPLORE.EXE IEXPLORE.EXE PID 1152 wrote to memory of 3300 1152 IEXPLORE.EXE IEXPLORE.EXE PID 1152 wrote to memory of 3300 1152 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe"C:\Users\Admin\AppData\Local\Temp\62b00f08bb0778a064a2cf32dc422e15e65c032c9645c395228ff14b85288dbd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 15805⤵
- Program crash
PID:4968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:17412 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:214018 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3212 -ip 32121⤵PID:2660