Analysis
-
max time kernel
208s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:31
Static task
static1
Behavioral task
behavioral1
Sample
55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe
Resource
win10v2004-20221111-en
General
-
Target
55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe
-
Size
560KB
-
MD5
2aff723ad8df4b75cc72e0886fc811da
-
SHA1
17dedb343cba91d36b10f2af7b23830fe4eb7d0d
-
SHA256
55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb
-
SHA512
bc70d6ea072a0557c992eaa50761b5557453ab772633a30bca7647e2f4a498d18857a20dd95fbee0aedafeea63c52bdc9bad19cf77e1955515bd627996b13b44
-
SSDEEP
12288:UKhykj00HzP0bQSQrQN9QLUwRGkt/x+MlhyIyNq:UKhyGRz8sSILUwRGSd9
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376004853" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3441798543" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d00aeb84ffd801 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cd62b78ee8587e4dac88ae50a840a17f00000000020000000000106600000001000020000000dc9d6ed78f48ca038b2fafb2e340537b6019685bbd982f3dd4c8909301bcb6c8000000000e8000000002000020000000c0a063dda7dc98517bd0d0dec32e7b685f41bee99162815a40954a15591875592000000060015722b4f3c6d5609f18d68085ce52598c5f9e93fa4a5c9037acd1fae63310400000007d657e5f520703714d75c01eb7f7575fbafcf88d386c36de3df8d3f22349dc72bbc73f309c1ef6991a354a5da993ea2b55db557eb8eeaceab434cd58223975d9 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3441798543" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998404" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cd62b78ee8587e4dac88ae50a840a17f00000000020000000000106600000001000020000000393b9923ffa4409cdd6724bade7b874ff2c68c68513f3ed7b556f7e38ca23d77000000000e80000000020000200000009e6efc524979c979c814f517c9175620367c8c7873920074356a4071c4f5ca0c200000008b52ab9de6e2c15fcb52258c4afbcc0fc4199f423753ca8ec7f069d9ddc744db40000000c1d437ce82b0c21a9d513444e4d834dd6999af5087c030b4582c39d556687558b461ced60215dc4fba3dd1f7d4678496318cc086171d408d3f9b215cefc465f4 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10980cf184ffd801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F3423860-6B77-11ED-B8D8-4ECC57E31487} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998404" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exedescription pid process Token: SeIncBasePriorityPrivilege 2692 55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 204 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2692 55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe 204 IEXPLORE.EXE 204 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exeIEXPLORE.EXEdescription pid process target process PID 2692 wrote to memory of 204 2692 55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe IEXPLORE.EXE PID 2692 wrote to memory of 204 2692 55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe IEXPLORE.EXE PID 204 wrote to memory of 1036 204 IEXPLORE.EXE IEXPLORE.EXE PID 204 wrote to memory of 1036 204 IEXPLORE.EXE IEXPLORE.EXE PID 204 wrote to memory of 1036 204 IEXPLORE.EXE IEXPLORE.EXE PID 2692 wrote to memory of 4564 2692 55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe cmd.exe PID 2692 wrote to memory of 4564 2692 55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe cmd.exe PID 2692 wrote to memory of 4564 2692 55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe"C:\Users\Admin\AppData\Local\Temp\55a9dc3894a107d2dc68e82294ec0e3f7e01d11521ed802f8ac12475af9b26eb.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.97199.com/install2/?sl32⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:204 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\55A9DC~1.EXE2⤵PID:4564