Analysis
-
max time kernel
401s -
max time network
408s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe
Resource
win10v2004-20221111-en
General
-
Target
c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe
-
Size
28KB
-
MD5
fa423a2f20f6dc9095651eb98f36ba6a
-
SHA1
2af567575c22fcfb5b9e7110e75e50ec655c5c17
-
SHA256
c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db
-
SHA512
34c10a8aebe840f6b9aa5ef5f49dff44935b0cb81b823e63d65576dc3318aeff294f37734b311bd3a5e9dd815a58b6569120fbe475c684ccf913ea76cf508f54
-
SSDEEP
192:/TKWiOnUaC8392rYYFidlBf7fkErrjzOWj4wZmsKqzOAy6BKpehcMnjI2UKhXU4m:/THioUaF398injtZm+e2zU4uZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\win = "c:\\windows\\ini.exe" c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\ini.exe c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe File opened for modification \??\c:\windows\ini.exe c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.iopera.org/" c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.iopera.org/" c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2224 c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe"C:\Users\Admin\AppData\Local\Temp\c0e5a03720a7d575066fc1e875912c8d3b4460e4f9258be56adabf80b28760db.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
PID:2224