Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe
Resource
win10v2004-20220901-en
General
-
Target
8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe
-
Size
36KB
-
MD5
030ec19b8d7c22d8802686029f2f35a0
-
SHA1
c367e3fdf3a3cad3bc04d054464b0c42c708ff45
-
SHA256
8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df
-
SHA512
7e86566120740f44dc96df6700eb13104b00e57a21dcf25a147ebf072ba1b51555a30ff2a2c3d171e93742116822f1cf82038dea665c0728bd75e38ce3441fb4
-
SSDEEP
768:HImtTP8eJe99c1GxaPno68KDbZSRnLyH5UmZ:oyTPHJe99c6eocZwnLyH5
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\cversions.3.db explorer.exe File created C:\Windows\SysWOW64\explorer.exe 8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog.etl explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\1033\StructuredQuerySchema.bin explorer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz explorer.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{470C0EBD-5D73-4D58-9CED-E91E22E23282} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000a13b87ec8e0ad901 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{23170F69-40C1-278A-1000-000100020000} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 010000000000000082ff8bec8e0ad901 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d030200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{11DBB47C-A525-400B-9E80-A54615A090C0} {7F9185B0-CB92-43C5-80A9-92277A4F7B54} 0xFFFF = 010000000000000081b1daec8e0ad901 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "6" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\ExplorerStartupTraceRecorded = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2016 8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2016 8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe 2016 8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe"C:\Users\Admin\AppData\Local\Temp\8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2016
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:1532
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵PID:3680