Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 03:11
Static task
static1
Behavioral task
behavioral1
Sample
b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe
Resource
win10v2004-20220812-en
General
-
Target
b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe
-
Size
233KB
-
MD5
c741505ad4e188c6fdf95bc3261fed53
-
SHA1
8ab01c9cc7a8565b79603f5a7fd218280dd0d9a7
-
SHA256
b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a
-
SHA512
c311ddcf2ebd47d099d36d2cf421d5a0790ae0c32090a66bad7b555d591331d85fd545e7f67681d87525e8affdbe580081a5df2811dfc2ad30775a1a6cc3c257
-
SSDEEP
6144:Asn8/LbZ1LW+13d9rU17cjuOEZXqdh4ymgj5ULNGR:AsncLt1qQ9r6kdRlUZGR
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\YDZ1QVAGOJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe" b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe File opened for modification C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe 1756 b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe"C:\Users\Admin\AppData\Local\Temp\b3e5890dd2b9a49925278d263f084c9a8702a9b9277a93c7f9b0967cfbf8661a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1756