Analysis
-
max time kernel
6s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:51
Behavioral task
behavioral1
Sample
06a8963da1e6741b4d7e7ec3b25fc36c.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
06a8963da1e6741b4d7e7ec3b25fc36c.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
06a8963da1e6741b4d7e7ec3b25fc36c.exe
-
Size
656KB
-
MD5
06a8963da1e6741b4d7e7ec3b25fc36c
-
SHA1
3487966ddefaf2fa039c5d722f09e9714ffd965e
-
SHA256
52d636b5455fd76da0c8eb0bc2e6356bc8d2f55c51f12c89c666be709ab99901
-
SHA512
25e51c19c316db005344f7316560f8674a9c7878816c1787597c4bd791291d6e6d75074e4e1accccef1ddbe21265d36f923e498891b222e9e4757ca69a8f5d2c
-
SSDEEP
12288:TiVJ/ursQkhepq03yAovfVKVjyydM7mfMGiaGmROCf7QqJBy90pg:TiVpurdkAvFXVjyy677BacobJByig
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2444-0-0x0000000000FB0000-0x000000000116F000-memory.dmp upx behavioral2/memory/2444-1-0x0000000000FB0000-0x000000000116F000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2704 2444 WerFault.exe 16 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\06a8963da1e6741b4d7e7ec3b25fc36c.exe = "11001" 06a8963da1e6741b4d7e7ec3b25fc36c.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID\ = "Setup.Application" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\ = "Setup" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\06a8963da1e6741b4d7e7ec3b25fc36c.exe" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ = "Setup.Application" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32\ = "ole32.dll" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F} 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\06a8963da1e6741b4d7e7ec3b25fc36c.exe\"" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\ = "Setup.Application" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90} 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID\ = "{017E057B-DACF-4A07-B878-E294565E3F90}" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS\ = "0" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR\ 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 06a8963da1e6741b4d7e7ec3b25fc36c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 06a8963da1e6741b4d7e7ec3b25fc36c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe 2444 06a8963da1e6741b4d7e7ec3b25fc36c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06a8963da1e6741b4d7e7ec3b25fc36c.exe"C:\Users\Admin\AppData\Local\Temp\06a8963da1e6741b4d7e7ec3b25fc36c.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 23762⤵
- Program crash
PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2444 -ip 24441⤵PID:4236