Analysis
-
max time kernel
142s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-12-2023 00:49
Behavioral task
behavioral1
Sample
b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe
-
Size
4.9MB
-
MD5
a428f22098d4415e1918298979f39f0c
-
SHA1
eb82e96448f7290ab7cff2663e7f0afe5990f6ae
-
SHA256
b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab
-
SHA512
88f5cbc476eee77132ff5c93bd7611fff5b9177ff51be5b1972c6bbc127b71fea032462d8869950910766201c3f69eaab7109d402edaccf2923949474e15c953
-
SSDEEP
98304:ynqYmrPz93PVnHhA89mIJua6akEyGvHG3pNKb1OG4U15J34eZpfnctSkq84AsgEN:ynWxDDGVIHGZAbxGsgf
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2168-0-0x0000000000400000-0x0000000000B53000-memory.dmp upx behavioral1/memory/2168-6300-0x0000000000400000-0x0000000000B53000-memory.dmp upx behavioral1/memory/2168-8703-0x00000000003D0000-0x00000000003DB000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
pid Process 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/?28879" b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Start Page b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?28879" b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 468 Process not Found 468 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe 2168 b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe"C:\Users\Admin\AppData\Local\Temp\b1d0bc88f45a8282ad4663414b6ff0fa550f067d2dae8347396d866dc20a6bab.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2168