Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 14:04
Static task
static1
Behavioral task
behavioral1
Sample
97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe
Resource
win10v2004-20231215-en
General
-
Target
97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe
-
Size
1.4MB
-
MD5
2f0d1effca8e06f489035a1e1facc192
-
SHA1
fd96f6c801e4791c82d2c7cf44c7a829d95a946b
-
SHA256
97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012
-
SHA512
a8deb4a624d5d83c1c5aa98aa986dd9ae0b261a9e57066853e2187fc9ea25308e1d1e072efe80d76e569ff93734a75447566c9a31f5b0536fae532383075166f
-
SSDEEP
24576:Y4U6dqpfTTGiyfhy584ihQuL87Etqq6vOSpd57vwvN4j6Ii3Vke3u:Y4XwppyU+87jd57v243akj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4832 set thread context of 1304 4832 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 91 PID 1304 set thread context of 3420 1304 calc.exe 44 PID 1304 set thread context of 3264 1304 calc.exe 100 PID 3264 set thread context of 3420 3264 wextract.exe 44 -
description ioc Process Key created \Registry\User\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wextract.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 1304 calc.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1304 calc.exe 3420 Explorer.EXE 3420 Explorer.EXE 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe 3264 wextract.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3420 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4832 wrote to memory of 1304 4832 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 91 PID 4832 wrote to memory of 1304 4832 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 91 PID 4832 wrote to memory of 1304 4832 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 91 PID 4832 wrote to memory of 1304 4832 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 91 PID 4832 wrote to memory of 1304 4832 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 91 PID 4832 wrote to memory of 1304 4832 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 91 PID 3420 wrote to memory of 3264 3420 Explorer.EXE 100 PID 3420 wrote to memory of 3264 3420 Explorer.EXE 100 PID 3420 wrote to memory of 3264 3420 Explorer.EXE 100 PID 3264 wrote to memory of 2180 3264 wextract.exe 105 PID 3264 wrote to memory of 2180 3264 wextract.exe 105 PID 3264 wrote to memory of 2180 3264 wextract.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe"C:\Users\Admin\AppData\Local\Temp\97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SYSWOW64\calc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1304
-
-
-
C:\Windows\SysWOW64\wextract.exe"C:\Windows\SysWOW64\wextract.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2180
-
-