Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe
Resource
win10v2004-20220901-en
General
-
Target
9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe
-
Size
808KB
-
MD5
c6ac909508da554bac2cdf6b59df5013
-
SHA1
ad29709876b37c8bc488991fc72ec9bcac132ea6
-
SHA256
9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702
-
SHA512
38f9734fe8ceea9311d88d234eecdf30015a4f031de3b6292ad398bdc9a7a87ab7e84759c38cf4424c91512989d84a4450300874483e80dac7c8e9eddf19a4f2
-
SSDEEP
12288:U+nHZs6bqE+yyuWSQ6hcRf2nj4r2amg0oueCd0kjMQ8ry9jRAGfxhQbB7rgJUO8:USHZliWpcRS4y9Gu159tJZe97rKUJ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2392 9A0EE2868BE.exe 4984 9A0EE2868BE.exe 3904 5wEC8D3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 5wEC8D3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9U7F2A5A6GVX2ZWYDFR = "C:\\Config.Msi\\9A0EE2868BE.exe /q" 5wEC8D3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5064 set thread context of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 2392 set thread context of 4984 2392 9A0EE2868BE.exe 80 -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\PhishingFilter 5wEC8D3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" 5wEC8D3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" 5wEC8D3.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery 5wEC8D3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" 5wEC8D3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 4984 9A0EE2868BE.exe 4984 9A0EE2868BE.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe 3904 5wEC8D3.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe Token: SeDebugPrivilege 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe Token: SeDebugPrivilege 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe Token: SeDebugPrivilege 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe Token: SeDebugPrivilege 4984 9A0EE2868BE.exe Token: SeDebugPrivilege 4984 9A0EE2868BE.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe Token: SeDebugPrivilege 3904 5wEC8D3.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 5064 wrote to memory of 4624 5064 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 76 PID 4624 wrote to memory of 2392 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 79 PID 4624 wrote to memory of 2392 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 79 PID 4624 wrote to memory of 2392 4624 9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe 79 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 2392 wrote to memory of 4984 2392 9A0EE2868BE.exe 80 PID 4984 wrote to memory of 3904 4984 9A0EE2868BE.exe 81 PID 4984 wrote to memory of 3904 4984 9A0EE2868BE.exe 81 PID 4984 wrote to memory of 3904 4984 9A0EE2868BE.exe 81 PID 4984 wrote to memory of 3904 4984 9A0EE2868BE.exe 81 PID 4984 wrote to memory of 3904 4984 9A0EE2868BE.exe 81 PID 3904 wrote to memory of 4624 3904 5wEC8D3.exe 76 PID 3904 wrote to memory of 4624 3904 5wEC8D3.exe 76 PID 3904 wrote to memory of 4624 3904 5wEC8D3.exe 76 PID 3904 wrote to memory of 4624 3904 5wEC8D3.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe"C:\Users\Admin\AppData\Local\Temp\9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe"C:\Users\Admin\AppData\Local\Temp\9465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Config.Msi\9A0EE2868BE.exe"C:\Config.Msi\9A0EE2868BE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Config.Msi\9A0EE2868BE.exe"C:\Config.Msi\9A0EE2868BE.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\5wEC8D3.exe"C:\Users\Admin\AppData\Local\Temp\5wEC8D3.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD5c6ac909508da554bac2cdf6b59df5013
SHA1ad29709876b37c8bc488991fc72ec9bcac132ea6
SHA2569465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702
SHA51238f9734fe8ceea9311d88d234eecdf30015a4f031de3b6292ad398bdc9a7a87ab7e84759c38cf4424c91512989d84a4450300874483e80dac7c8e9eddf19a4f2
-
Filesize
808KB
MD5c6ac909508da554bac2cdf6b59df5013
SHA1ad29709876b37c8bc488991fc72ec9bcac132ea6
SHA2569465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702
SHA51238f9734fe8ceea9311d88d234eecdf30015a4f031de3b6292ad398bdc9a7a87ab7e84759c38cf4424c91512989d84a4450300874483e80dac7c8e9eddf19a4f2
-
Filesize
808KB
MD5c6ac909508da554bac2cdf6b59df5013
SHA1ad29709876b37c8bc488991fc72ec9bcac132ea6
SHA2569465f89ea8236eb45d70c44f814b28e25cfd0224dae1446f3bc080b40613c702
SHA51238f9734fe8ceea9311d88d234eecdf30015a4f031de3b6292ad398bdc9a7a87ab7e84759c38cf4424c91512989d84a4450300874483e80dac7c8e9eddf19a4f2
-
Filesize
346KB
MD5243f8483fe7eac4ca48bb4ef03d79801
SHA1226750dc788d91c7782cf517c7816092fa6182a8
SHA256670f426a6f3648e27b08032e9d48398f092ccae6942c653c7e5e50648924ae1b
SHA51263cdd7c47749d21255a9f02bff706f7b5c346737169686f5be9b72844a21658f93138a47870f574296385d441372f811650771b38740ddc4c0fbd8bf1a776ffb
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be