Analysis
-
max time kernel
410s -
max time network
479s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 13:58
Static task
static1
Behavioral task
behavioral1
Sample
e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe
Resource
win10v2004-20221111-en
General
-
Target
e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe
-
Size
156KB
-
MD5
92b253f2e92a880ba5532ad89a36b2ba
-
SHA1
788d7749b2cbcd3e592890411bb6f3e27e75071a
-
SHA256
e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea
-
SHA512
e389874d740e16fbb0aeca6b1b483f72a38ee460f95d13cb0e951179c97901ddad27977321c33f61e01c3a61a8475b2a7ebc5e6faf8493d91283158a35e1ea9f
-
SSDEEP
3072:zePoZO+WfapEDGhSdSUxxifeZuZCxQNsUq5rbMBTmnaW+vihLxhBL:zeDnDGhSdS4FJxGsp5rQl8+qhLN
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dkvfvi = "C:\\Users\\Admin\\AppData\\Roaming\\Dkvfvi.exe" iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4832 set thread context of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{4379AA91-76CB-11ED-B5DD-66300FA194E6} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe Token: SeDebugPrivilege 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe Token: SeDebugPrivilege 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3720 IEXPLORE.EXE 3720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4832 wrote to memory of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 PID 4832 wrote to memory of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 PID 4832 wrote to memory of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 PID 4832 wrote to memory of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 PID 4832 wrote to memory of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 PID 4832 wrote to memory of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 PID 4832 wrote to memory of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 PID 4832 wrote to memory of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 PID 4832 wrote to memory of 1172 4832 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 82 PID 1172 wrote to memory of 2364 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 85 PID 1172 wrote to memory of 2364 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 85 PID 1172 wrote to memory of 2364 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 85 PID 2364 wrote to memory of 3720 2364 iexplore.exe 86 PID 2364 wrote to memory of 3720 2364 iexplore.exe 86 PID 1172 wrote to memory of 2364 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 85 PID 1172 wrote to memory of 2364 1172 e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe 85 PID 3720 wrote to memory of 3688 3720 IEXPLORE.EXE 88 PID 3720 wrote to memory of 3688 3720 IEXPLORE.EXE 88 PID 3720 wrote to memory of 3688 3720 IEXPLORE.EXE 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe"C:\Users\Admin\AppData\Local\Temp\e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe"C:\Users\Admin\AppData\Local\Temp\e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3720 CREDAT:17410 /prefetch:25⤵PID:3688
-
-
-
-