Analysis
-
max time kernel
151s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 15:07
Static task
static1
Behavioral task
behavioral1
Sample
2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe
Resource
win10v2004-20221111-en
General
-
Target
2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe
-
Size
69KB
-
MD5
554dd8150131baf99775e70ae2be1686
-
SHA1
e45bb6610a4c76e59fa309bf3d76dc0d8b29cfb1
-
SHA256
2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6
-
SHA512
b153e24ae925ce293e106fbd415acf33d61cb78d8e07efe08033d99d5f70da34353bde172b255d747b409b3955da0b6799b7d150864d54d962073d9c398b41a5
-
SSDEEP
1536:VoquHm0GQGLWSek2ECz0/4ASY+A37feaCMJDmYsLIb4PvYqHB/AdGq:xF0c3/4ASDADeak7dJHB/AdGq
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2000 set thread context of 208 2000 2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe 86 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001887" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001887" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001887" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3576941708" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3451318081" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3451474873" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3576941708" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001887" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F4569783-7912-11ED-BF5F-DAD30C974647} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377500808" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\xpigeon\config = 10372b2c62696969766f6d766a6b6f766a68692408372a2c62606869241f2a372d28629cf49097ef8e8fb12408392b2b2f372a3c6269696a6a6b6b24152d2c3d2062322b2c2d39313c 2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\xpigeon\path = 433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c54656d705c323435306363623839663230363038653130616331366364636531353532666639353032306235663961386531386263393534393734396430376636666262362e657865 2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpigeon 2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 208 iexplore.exe 208 iexplore.exe 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2000 wrote to memory of 208 2000 2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe 86 PID 2000 wrote to memory of 208 2000 2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe 86 PID 2000 wrote to memory of 208 2000 2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe 86 PID 208 wrote to memory of 3340 208 iexplore.exe 87 PID 208 wrote to memory of 3340 208 iexplore.exe 87 PID 208 wrote to memory of 3340 208 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe"C:\Users\Admin\AppData\Local\Temp\2450ccb89f20608e10ac16cdce1552ff95020b5f9a8e18bc9549749d07f6fbb6.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:208 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3340
-
-