Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:09
Behavioral task
behavioral1
Sample
0016d32eaf72432adab7b9f9c5c264df.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
0016d32eaf72432adab7b9f9c5c264df.exe
-
Size
428KB
-
MD5
0016d32eaf72432adab7b9f9c5c264df
-
SHA1
0ddf731c04356914168ba8dd0c99c0f93e51e3b3
-
SHA256
ddc8c68c8bc20e9e164bc299cc31edb3602b69d0782951590cd03bd7ba6aebe5
-
SHA512
b25f7144c243d058871f05d6b0a3c3d631619fab4e4bfe4aea734799b1cf099af29c4c9d670c120bdf3118396b04f778be3540d2b6eb4412b86b0f8f41734455
-
SSDEEP
12288:4oAmaR7ZNk0abLT+Erfu43UlGaLk4dkm:4oABteLPrm43U0aLJN
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 0016d32eaf72432adab7b9f9c5c264df.exe File created C:\Windows\system32\drivers\etc\hosts 0016d32eaf72432adab7b9f9c5c264df.exe -
resource yara_rule behavioral1/memory/2240-0-0x0000000000400000-0x0000000000505000-memory.dmp vmprotect behavioral1/memory/2240-1-0x0000000000400000-0x0000000000505000-memory.dmp vmprotect behavioral1/memory/2240-32-0x0000000000400000-0x0000000000505000-memory.dmp vmprotect -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0016d32eaf72432adab7b9f9c5c264df.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2240 0016d32eaf72432adab7b9f9c5c264df.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main 0016d32eaf72432adab7b9f9c5c264df.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2240 0016d32eaf72432adab7b9f9c5c264df.exe 2240 0016d32eaf72432adab7b9f9c5c264df.exe 2240 0016d32eaf72432adab7b9f9c5c264df.exe 2240 0016d32eaf72432adab7b9f9c5c264df.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0016d32eaf72432adab7b9f9c5c264df.exe"C:\Users\Admin\AppData\Local\Temp\0016d32eaf72432adab7b9f9c5c264df.exe"1⤵
- Drops file in Drivers directory
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240