Analysis
-
max time kernel
70s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:59
Static task
static1
Behavioral task
behavioral1
Sample
1b4e565fbef5131b21dfbf39a2c332b4.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b4e565fbef5131b21dfbf39a2c332b4.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
1b4e565fbef5131b21dfbf39a2c332b4.exe
-
Size
291KB
-
MD5
1b4e565fbef5131b21dfbf39a2c332b4
-
SHA1
1f79288c2131589ad3b79c42c4fc58c049615cbf
-
SHA256
43fa288c0804ad5772a0b2de6c1406d47a039e37faf2077374714ea3fbb18c6d
-
SHA512
8ac5ae07c8cb0d2ba03f73024028ad55872743e8f0c59a516e341f065c80b624174395b373d677b7ac049a01e57fd39cea65c8d77cf0b8d4110fd448d20665e4
-
SSDEEP
6144:+FTb4MFvDpB7wY4n74fHyjZRVkcLpy7u/qbWhp7KB:+eevVZu7WoZRVTcu/qqhpWB
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3020 axoxib.exe -
Loads dropped DLL 2 IoCs
pid Process 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\{334A3548-CEF1-AD4E-EADF-D61AC06FF507} = "C:\\Users\\Admin\\AppData\\Roaming\\Itefl\\axoxib.exe" axoxib.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2484 set thread context of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 -
Program crash 1 IoCs
pid pid_target Process procid_target 2360 596 WerFault.exe 20 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Privacy 1b4e565fbef5131b21dfbf39a2c332b4.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 1b4e565fbef5131b21dfbf39a2c332b4.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe 3020 axoxib.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 3020 axoxib.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3020 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 23 PID 2484 wrote to memory of 3020 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 23 PID 2484 wrote to memory of 3020 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 23 PID 2484 wrote to memory of 3020 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 23 PID 3020 wrote to memory of 1212 3020 axoxib.exe 18 PID 3020 wrote to memory of 1212 3020 axoxib.exe 18 PID 3020 wrote to memory of 1212 3020 axoxib.exe 18 PID 3020 wrote to memory of 1212 3020 axoxib.exe 18 PID 3020 wrote to memory of 1212 3020 axoxib.exe 18 PID 3020 wrote to memory of 1292 3020 axoxib.exe 17 PID 3020 wrote to memory of 1292 3020 axoxib.exe 17 PID 3020 wrote to memory of 1292 3020 axoxib.exe 17 PID 3020 wrote to memory of 1292 3020 axoxib.exe 17 PID 3020 wrote to memory of 1292 3020 axoxib.exe 17 PID 3020 wrote to memory of 1364 3020 axoxib.exe 15 PID 3020 wrote to memory of 1364 3020 axoxib.exe 15 PID 3020 wrote to memory of 1364 3020 axoxib.exe 15 PID 3020 wrote to memory of 1364 3020 axoxib.exe 15 PID 3020 wrote to memory of 1364 3020 axoxib.exe 15 PID 3020 wrote to memory of 2008 3020 axoxib.exe 14 PID 3020 wrote to memory of 2008 3020 axoxib.exe 14 PID 3020 wrote to memory of 2008 3020 axoxib.exe 14 PID 3020 wrote to memory of 2008 3020 axoxib.exe 14 PID 3020 wrote to memory of 2008 3020 axoxib.exe 14 PID 3020 wrote to memory of 2484 3020 axoxib.exe 16 PID 3020 wrote to memory of 2484 3020 axoxib.exe 16 PID 3020 wrote to memory of 2484 3020 axoxib.exe 16 PID 3020 wrote to memory of 2484 3020 axoxib.exe 16 PID 3020 wrote to memory of 2484 3020 axoxib.exe 16 PID 2484 wrote to memory of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 PID 2484 wrote to memory of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 PID 2484 wrote to memory of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 PID 2484 wrote to memory of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 PID 2484 wrote to memory of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 PID 2484 wrote to memory of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 PID 2484 wrote to memory of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 PID 2484 wrote to memory of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 PID 2484 wrote to memory of 596 2484 1b4e565fbef5131b21dfbf39a2c332b4.exe 20 PID 596 wrote to memory of 2360 596 cmd.exe 22 PID 596 wrote to memory of 2360 596 cmd.exe 22 PID 596 wrote to memory of 2360 596 cmd.exe 22 PID 596 wrote to memory of 2360 596 cmd.exe 22 PID 3020 wrote to memory of 380 3020 axoxib.exe 21 PID 3020 wrote to memory of 380 3020 axoxib.exe 21 PID 3020 wrote to memory of 380 3020 axoxib.exe 21 PID 3020 wrote to memory of 380 3020 axoxib.exe 21 PID 3020 wrote to memory of 380 3020 axoxib.exe 21 PID 3020 wrote to memory of 2360 3020 axoxib.exe 22 PID 3020 wrote to memory of 2360 3020 axoxib.exe 22 PID 3020 wrote to memory of 2360 3020 axoxib.exe 22 PID 3020 wrote to memory of 2360 3020 axoxib.exe 22 PID 3020 wrote to memory of 2360 3020 axoxib.exe 22
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2008
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\1b4e565fbef5131b21dfbf39a2c332b4.exe"C:\Users\Admin\AppData\Local\Temp\1b4e565fbef5131b21dfbf39a2c332b4.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5409c2df.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 596 -s 1164⤵
- Program crash
PID:2360
-
-
-
C:\Users\Admin\AppData\Roaming\Itefl\axoxib.exe"C:\Users\Admin\AppData\Roaming\Itefl\axoxib.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1292
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1212
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "9233790091991598388-1200518130-10468129561208338918-30729657588808463192369889"1⤵PID:380