Analysis
-
max time kernel
206s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 02:48
Static task
static1
Behavioral task
behavioral1
Sample
7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe
Resource
win10v2004-20221111-en
General
-
Target
7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe
-
Size
172KB
-
MD5
e7a67f9f1a240bbd31e85ac4bb20d1ea
-
SHA1
bd05704209226db8c1fe7bc04c552e80050c77a4
-
SHA256
7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb
-
SHA512
2c023941fad949ed7b8f737deddd74a3035f74767b7cf22eb65d96b4af03a1791bff9d044c3b4d18a5d4be3ee5cb6272e3a7a3b7b404b04fd81a9ce9b44ddc0a
-
SSDEEP
1536:8+4G9Paz/Om80cQXTvJlQZfAgZdgx9opbzv1Nwn8yHCtJ1tOdAR5H/Qt8Upkd:oP/vJyNIXKbS8Z2dADfQt8Upkd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CA86F85F-72D0-11ED-919F-7A41DBBD5662} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 764 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 764 IEXPLORE.EXE 764 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4212 wrote to memory of 2980 4212 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 90 PID 4212 wrote to memory of 2980 4212 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 90 PID 4212 wrote to memory of 2980 4212 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 90 PID 2980 wrote to memory of 3844 2980 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 91 PID 2980 wrote to memory of 3844 2980 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 91 PID 2980 wrote to memory of 3844 2980 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 91 PID 3844 wrote to memory of 764 3844 iexplore.exe 93 PID 3844 wrote to memory of 764 3844 iexplore.exe 93 PID 764 wrote to memory of 988 764 IEXPLORE.EXE 94 PID 764 wrote to memory of 988 764 IEXPLORE.EXE 94 PID 764 wrote to memory of 988 764 IEXPLORE.EXE 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe"C:\Users\Admin\AppData\Local\Temp\7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exeC:\Users\Admin\AppData\Local\Temp\7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe -rc2⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\program files (x86)\Internet Explorer\iexplore.exe"C:\program files (x86)\Internet Explorer\iexplore.exe" ya.ru3⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" ya.ru4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:988
-
-
-
-