Analysis
-
max time kernel
153s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 12:22
Static task
static1
Behavioral task
behavioral1
Sample
e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe
-
Size
190KB
-
MD5
0efd60d786dcbb576ae58e972c1a2af7
-
SHA1
3e5dbf1c1705301e7c74702eaf2a15dbe61633b9
-
SHA256
e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342
-
SHA512
5053692afa2765c832f1ab031d096a0be27189e9ef96ca2e6d3aa991fbd5312c16130c59ede024a32f531fe2cd6caf4d542e5b7a75d43543134f6df0b7d68c7f
-
SSDEEP
3072:tJHZhFQur3ZsZ3o2HO/Kmj0itWbTV8NVT+x02z6YF69XJ79eoExd8:HHZPDri3MiQtWaNdqBz6YKDbOd
Malware Config
Extracted
Family
gootkit
Botnet
2855
C2
me.jmitchelldayton.com
otnhmtkwodm1.site
Attributes
-
vendor_id
2855
Signatures
-
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exepid process 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exedescription pid process target process PID 1672 wrote to memory of 1608 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe PID 1672 wrote to memory of 1608 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe PID 1672 wrote to memory of 1608 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe PID 1672 wrote to memory of 1608 1672 e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe"C:\Users\Admin\AppData\Local\Temp\e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe"1⤵
- Modifies Internet Explorer Protected Mode
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exeC:\Users\Admin\AppData\Local\Temp\e2a63790f641f0eef2689f693740d566b9d701ed3d30aae745ffd0ae4acec342.exe --vwxyz2⤵PID:1608
-