Analysis
-
max time kernel
48s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
15-02-2023 15:46
Behavioral task
behavioral1
Sample
ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe
Resource
win10v2004-20221111-en
General
-
Target
ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe
-
Size
686KB
-
MD5
33d613e304e608b25fd6e546d484fcfc
-
SHA1
68f5d14b015f939de73a40084612c0900b2babc9
-
SHA256
ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035
-
SHA512
a97124b4230ec651b9ec395189456ac3bf08e791d949036c4e4f158a4b8f4db63b96bb71d1f7efc2351f6880d5b757415e5cefcad203b70d110e59469730f3e2
-
SSDEEP
12288:ke/wr0yMYAejSj5Fg4/jBK7WhbVH2qn2jud3bruiKMziFKhjVCmp3QeumSVzOsJz:keYLAejq9I7ob92KlbrVdO05CmaV1Jz
Malware Config
Signatures
-
Processes:
ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\dogfight360.com ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.dogfight360.com ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\dogfight360.com\NumberOfSubdomains = "1" ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.dogfight360.com\ = "63" ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\dogfight360.com\Total = "63" ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 296 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 296 AUDIODG.EXE Token: 33 296 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 296 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exepid process 2040 ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe 2040 ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe 2040 ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe 2040 ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe"C:\Users\Admin\AppData\Local\Temp\ece71f334410bd59eb78927e8877237ea3cec84153b856e14bc48ad52ce34035.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4881⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1356-61-0x000007FEFBFB1000-0x000007FEFBFB3000-memory.dmpFilesize
8KB
-
memory/2040-54-0x0000000075511000-0x0000000075513000-memory.dmpFilesize
8KB
-
memory/2040-55-0x00000000009C0000-0x0000000000B70000-memory.dmpFilesize
1.7MB
-
memory/2040-56-0x00000000009C0000-0x0000000000B70000-memory.dmpFilesize
1.7MB
-
memory/2040-57-0x00000000009C0000-0x0000000000B70000-memory.dmpFilesize
1.7MB
-
memory/2040-58-0x00000000009C0000-0x0000000000B70000-memory.dmpFilesize
1.7MB
-
memory/2040-60-0x00000000009C0000-0x0000000000B70000-memory.dmpFilesize
1.7MB