Analysis
-
max time kernel
171s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
23602e7406d6db7db69cf9844b545e81.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
23602e7406d6db7db69cf9844b545e81.exe
-
Size
4.3MB
-
MD5
23602e7406d6db7db69cf9844b545e81
-
SHA1
565a4999f652c9f5339b6915b6421f0392de62b1
-
SHA256
53cf8d085dc6d516bc1c933b992c5296e3aa57cc11da52c2f1ca7ef0bab1af43
-
SHA512
78c5ca7e844d4a409b68d850601662ef1685e79dd9ab9b6dc7f547aa347f50db7975f5ac7226a421306670e6acf6e257a47a3785be7c6981f9d085abc03eb52f
-
SSDEEP
98304:pwsY1zqKdR4MK1FQq0DlayBYuBRyQ6lekAn6pTrCX5:pwl1zqgYqq0layyO2TZ2J
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 23602e7406d6db7db69cf9844b545e81.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{799D87DB-A8E1-11EE-B6AD-C6E29C351F1E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2296 23602e7406d6db7db69cf9844b545e81.exe 2296 23602e7406d6db7db69cf9844b545e81.exe 4848 iexplore.exe 4848 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 1404 4848 iexplore.exe 110 PID 4848 wrote to memory of 1404 4848 iexplore.exe 110 PID 4848 wrote to memory of 1404 4848 iexplore.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\23602e7406d6db7db69cf9844b545e81.exe"C:\Users\Admin\AppData\Local\Temp\23602e7406d6db7db69cf9844b545e81.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:2296
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding1⤵PID:5060
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4848 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:1404
-