Analysis
-
max time kernel
338s -
max time network
453s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:19
Static task
static1
Behavioral task
behavioral1
Sample
bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe
Resource
win10v2004-20221111-en
General
-
Target
bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe
-
Size
449KB
-
MD5
47639feddde2a9256370f24b897ac939
-
SHA1
ac60224a44d8407bf7b9023c40c1f1652e6ffecc
-
SHA256
bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83
-
SHA512
86235c640f7eac4a683f65fbfc4ed478964e7938eb1a73c1e577d77cbc37b2c91f6cf5a39ad4dcbe35bab76e17953ba8ec607047cced754c0309d9a73bf1c79f
-
SSDEEP
12288:JaChKpLtueBdtikbc1NVX53Ukr8dx/NWjXEK0OpS6Hs:8aKnDBdtikbc1x3XrSx/NOEKZbM
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{85153D85-6B76-11ED-B5DD-C2D7A23AFBD4} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exedescription pid process Token: SeIncBasePriorityPrivilege 1552 bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exeIEXPLORE.EXEpid process 1552 bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe 3344 IEXPLORE.EXE 3344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exeIEXPLORE.EXEdescription pid process target process PID 1552 wrote to memory of 3344 1552 bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe IEXPLORE.EXE PID 1552 wrote to memory of 3344 1552 bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe IEXPLORE.EXE PID 3344 wrote to memory of 4076 3344 IEXPLORE.EXE IEXPLORE.EXE PID 3344 wrote to memory of 4076 3344 IEXPLORE.EXE IEXPLORE.EXE PID 3344 wrote to memory of 4076 3344 IEXPLORE.EXE IEXPLORE.EXE PID 1552 wrote to memory of 4816 1552 bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe cmd.exe PID 1552 wrote to memory of 4816 1552 bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe cmd.exe PID 1552 wrote to memory of 4816 1552 bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe"C:\Users\Admin\AppData\Local\Temp\bdfe9399911508a4d213e9281789b49849bb71a02ca51658dfea498009ee8e83.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://123.kukankan.com/index2.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3344 CREDAT:17410 /prefetch:23⤵PID:4076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\BDFE93~1.EXE2⤵PID:4816