Analysis
-
max time kernel
169s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 20:36
Static task
static1
Behavioral task
behavioral1
Sample
6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe
Resource
win10v2004-20220812-en
General
-
Target
6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe
-
Size
1.6MB
-
MD5
02ab93819c88e421101c550e3709d63e
-
SHA1
4db3a3549097e1b9d5ac1ed5f9e7347bc5dc480e
-
SHA256
6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4
-
SHA512
caaa4d801ee891af4cf9684de95a65fb1f7f2e6eee8a636082cfc781f6c56ce787af2f1c2731cd913204a49b9b882e57b91c405c3d22ccb136238d1d61d24851
-
SSDEEP
49152:hEH/bqbGSCbalaJBPlXhc5quwtk1P4FZe496gboPmAEFIYJ:AOSbalqPZhRudSZe4gjmA9YJ
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
Processes:
6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exepid process 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe -
Processes:
6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\123.51pc114.cn\ = "63" 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\51pc114.cn\Total = "63" 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\51pc114.cn\NumberOfSubdomains = "1" 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\123.51pc114.cn 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\51pc114.cn 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\51pc114.cn 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exepid process 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exepid process 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exepid process 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe 428 6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe"C:\Users\Admin\AppData\Local\Temp\6cc36d78cd8a16e272a3b646bb6e5d31ed8f608bff2ffa5c52d4d0d66cc918d4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:428