Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:36
Behavioral task
behavioral1
Sample
72c5438987f39d06fcacaaf6020850e3.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
72c5438987f39d06fcacaaf6020850e3.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
72c5438987f39d06fcacaaf6020850e3.exe
-
Size
38KB
-
MD5
72c5438987f39d06fcacaaf6020850e3
-
SHA1
9227f95f2d0679945d4642668d3b02d595aa5f1f
-
SHA256
7df8229d5ae53d5e7b8cad9a4bcda5c0b1b55cd413b79068c32ab092e65c752b
-
SHA512
2f12c3ca7f892d6a7444040c28a21bae0532196d81603d975005f44ecc13b8f5357b7bb3b84633ff6b6ae9a5d30da578e4fd09ce3146a2f0eda50d99f02c4058
-
SSDEEP
768:J1cGTJEcAxRwi2sUOcVOjfZZJcu9ZdQQWp:JnS5xdzBuQfZxZdQQWp
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 72c5438987f39d06fcacaaf6020850e3.exe -
resource yara_rule behavioral2/memory/3888-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3888-1-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{82E1ADD4-ACAB-11EE-9A4E-72AE6231743A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3888 72c5438987f39d06fcacaaf6020850e3.exe 3888 72c5438987f39d06fcacaaf6020850e3.exe 3888 72c5438987f39d06fcacaaf6020850e3.exe 3888 72c5438987f39d06fcacaaf6020850e3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3744 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3744 iexplore.exe 3744 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3888 wrote to memory of 3744 3888 72c5438987f39d06fcacaaf6020850e3.exe 109 PID 3888 wrote to memory of 3744 3888 72c5438987f39d06fcacaaf6020850e3.exe 109 PID 3744 wrote to memory of 2856 3744 iexplore.exe 111 PID 3744 wrote to memory of 2856 3744 iexplore.exe 111 PID 3744 wrote to memory of 2856 3744 iexplore.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c5438987f39d06fcacaaf6020850e3.exe"C:\Users\Admin\AppData\Local\Temp\72c5438987f39d06fcacaaf6020850e3.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.download787.com/sanity.php?1=478214-100132⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3744 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
-