Analysis
-
max time kernel
41s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 10:54
Behavioral task
behavioral1
Sample
cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe
Resource
win7-20220812-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe
Resource
win10v2004-20220812-en
5 signatures
150 seconds
General
-
Target
cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe
-
Size
1.2MB
-
MD5
51ce1ff2faf4e84aa604ab04fc62ed52
-
SHA1
b99df65cca4a8cc7f8db5fe0ce87da81cdb34567
-
SHA256
cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd
-
SHA512
1d5fdc7dc9705ee055da985e18fb6bf78ee0946e8b779a9fe704d520661bda37c48070c029f2214da257fffaeaf86875b816faaab1ce95fb5e303508040f2790
-
SSDEEP
24576:1Pkt5swPk1HIAL7FurdLXWUp8vRsosD2TdS3rVYO:GkyI7ErBWUqvgcyOO
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe -
resource yara_rule behavioral1/memory/2016-54-0x0000000000400000-0x0000000000641000-memory.dmp vmprotect behavioral1/memory/2016-59-0x0000000000400000-0x0000000000641000-memory.dmp vmprotect behavioral1/memory/2016-67-0x0000000000400000-0x0000000000641000-memory.dmp vmprotect -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.mangafull.com/Buscador/BuscadorTotal.htm" cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2016 cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe 2016 cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe 2016 cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe"C:\Users\Admin\AppData\Local\Temp\cc6ca07482e9ceb9cdfd6efbc53511394a9a28722ec9bd7993c416570bcd4fbd.exe"1⤵
- Drops file in Drivers directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
PID:2016