Analysis
-
max time kernel
0s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5fd52a6260c48ddfa1b09b315c484890.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
5fd52a6260c48ddfa1b09b315c484890.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
5fd52a6260c48ddfa1b09b315c484890.exe
-
Size
82KB
-
MD5
5fd52a6260c48ddfa1b09b315c484890
-
SHA1
f73c7cdbc6a953dfc1d0715329e1304abcc31ca1
-
SHA256
cfffce6bd2662276419b441e091517b44a84b8580f62442e1e372c6af2251ce1
-
SHA512
40c72b0d217227b3ad08f0911a74f3af74edaefbeb6d057b07dbd4c207ebdd3737d511cc625da9fc9886e8e42fa6c14159a39a152226dbdca0fcc8ae27a0a7dd
-
SSDEEP
1536:R6KDqIaiMHQC4DGjP5dEINWu7ajYEYGMe0mN+CkjvHjnyppguRQxg+HdU/cOz:R6KgiCQC4DGTDD5ajYErKmNo7nKpDite
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CCB09944-A4BF-11EE-BD28-76CF25FE979C} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2760 5fd52a6260c48ddfa1b09b315c484890.exe 5044 IEXPLORE.EXE 5044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2760 wrote to memory of 5044 2760 5fd52a6260c48ddfa1b09b315c484890.exe 17 PID 2760 wrote to memory of 5044 2760 5fd52a6260c48ddfa1b09b315c484890.exe 17 PID 5044 wrote to memory of 3204 5044 IEXPLORE.EXE 19 PID 5044 wrote to memory of 3204 5044 IEXPLORE.EXE 19 PID 5044 wrote to memory of 3204 5044 IEXPLORE.EXE 19 PID 2760 wrote to memory of 4920 2760 5fd52a6260c48ddfa1b09b315c484890.exe 20 PID 2760 wrote to memory of 4920 2760 5fd52a6260c48ddfa1b09b315c484890.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fd52a6260c48ddfa1b09b315c484890.exe"C:\Users\Admin\AppData\Local\Temp\5fd52a6260c48ddfa1b09b315c484890.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.on86.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5044 CREDAT:17410 /prefetch:23⤵PID:3204
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.xingkongjisu.com/flashplayer.htm?52c2⤵PID:4920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\5FD52A~1.EXE2⤵PID:1708
-