Analysis
-
max time kernel
166s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 04:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ed17218922983563f641205bf3633e4.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
General
-
Target
0ed17218922983563f641205bf3633e4.exe
-
Size
136KB
-
MD5
0ed17218922983563f641205bf3633e4
-
SHA1
3390496a47723f0580cf30e4452ed72850716cd6
-
SHA256
794f69a8da9cf706107a43b8806673c8528c02b161c7b4eb242619966b61758d
-
SHA512
aaa168d71bfbd3ae3091b55e35a7d18c10733bdcdb0fd7d6ef291d413a98287777cb78b3f24d55c2a41e6fbcaae5fa9889641c47787eb79f98c1167f4bfc25e5
-
SSDEEP
3072:WHbm4jjtFbC4O13RKrEgOEi3w0wZ5XQ3DPm3gX9MaBdCeXrFVzAD6TblE/:W6uOs0wZ5XQ3Lm3gX9MaBdCeXBVEu
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0ed17218922983563f641205bf3633e4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0ed17218922983563f641205bf3633e4.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1052623846" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079472" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31079472" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1053404846" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{734E934E-A823-11EE-B6AD-DE9D3A49EF0E} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2376 0ed17218922983563f641205bf3633e4.exe 3852 0ed17218922983563f641205bf3633e4.exe 1724 iexplore.exe 1724 iexplore.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3852 2376 0ed17218922983563f641205bf3633e4.exe 95 PID 2376 wrote to memory of 3852 2376 0ed17218922983563f641205bf3633e4.exe 95 PID 2376 wrote to memory of 3852 2376 0ed17218922983563f641205bf3633e4.exe 95 PID 1724 wrote to memory of 3968 1724 iexplore.exe 105 PID 1724 wrote to memory of 3968 1724 iexplore.exe 105 PID 1724 wrote to memory of 3968 1724 iexplore.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ed17218922983563f641205bf3633e4.exe"C:\Users\Admin\AppData\Local\Temp\0ed17218922983563f641205bf3633e4.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\0ed17218922983563f641205bf3633e4.exeC:\Users\Admin\AppData\Local\Temp\0ed17218922983563f641205bf3633e4.exe cjbotdesktop25612⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3852
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2560
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:17410 /prefetch:22⤵PID:3968
-