Analysis
-
max time kernel
91s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:43
Behavioral task
behavioral1
Sample
039c21d3d696776b8cbaa14addadc60a.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
039c21d3d696776b8cbaa14addadc60a.exe
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
039c21d3d696776b8cbaa14addadc60a.exe
-
Size
661KB
-
MD5
039c21d3d696776b8cbaa14addadc60a
-
SHA1
4d0baca7afaffe0405c11a9473577ea0a3da09f5
-
SHA256
2427dda6539ff14e9623348042c7daba7db5c9a0511aee155dfd1708c30bf804
-
SHA512
1bab2dc01aedf75686312664bb82d7ffab6a8ab920e25cd1b18c2ae3098ec7eaa5c5e488a4f553801f1a67815739fbffc5dba0b642f85703d8adf01b703d3221
-
SSDEEP
12288:/SI2A2u/WGo+n31k1OxVGL5xLz7MGuU/YuLW4htuM7Cy90Xg:KI72u/WGo41kSGtx37rYuLoyYg
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4592-0-0x0000000000CE0000-0x0000000000EA0000-memory.dmp upx behavioral2/memory/4592-3-0x0000000000CE0000-0x0000000000EA0000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4592 039c21d3d696776b8cbaa14addadc60a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 412 4592 WerFault.exe 82 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 039c21d3d696776b8cbaa14addadc60a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\039c21d3d696776b8cbaa14addadc60a.exe = "11001" 039c21d3d696776b8cbaa14addadc60a.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID\ = "{017E057B-DACF-4A07-B878-E294565E3F90}" 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ = "Setup.Application" 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\ = "Setup.Application" 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90} 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID\ = "Setup.Application" 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\039c21d3d696776b8cbaa14addadc60a.exe\"" 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F} 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS\ = "0" 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\039c21d3d696776b8cbaa14addadc60a.exe" 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\ = "Setup" 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR\ 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 039c21d3d696776b8cbaa14addadc60a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID 039c21d3d696776b8cbaa14addadc60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32\ = "ole32.dll" 039c21d3d696776b8cbaa14addadc60a.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4592 039c21d3d696776b8cbaa14addadc60a.exe 4592 039c21d3d696776b8cbaa14addadc60a.exe 4592 039c21d3d696776b8cbaa14addadc60a.exe 4592 039c21d3d696776b8cbaa14addadc60a.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4592 039c21d3d696776b8cbaa14addadc60a.exe 4592 039c21d3d696776b8cbaa14addadc60a.exe 4592 039c21d3d696776b8cbaa14addadc60a.exe 4592 039c21d3d696776b8cbaa14addadc60a.exe 4592 039c21d3d696776b8cbaa14addadc60a.exe 4592 039c21d3d696776b8cbaa14addadc60a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\039c21d3d696776b8cbaa14addadc60a.exe"C:\Users\Admin\AppData\Local\Temp\039c21d3d696776b8cbaa14addadc60a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 23402⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4592 -ip 45921⤵PID:4084