Analysis
-
max time kernel
157s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 15:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4bd3d3b40ef36ea45835e1adb0b9c98a.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4bd3d3b40ef36ea45835e1adb0b9c98a.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
4bd3d3b40ef36ea45835e1adb0b9c98a.exe
-
Size
5.0MB
-
MD5
4bd3d3b40ef36ea45835e1adb0b9c98a
-
SHA1
3585725336d55dda8773b74fffaace791392a8de
-
SHA256
176fd490b65871a0cc0eae08b372b39ec4fd2f1822dcefcdd4a69bd98b9d36bf
-
SHA512
0382ed3a6bdec171fa2759b61a679c8981b3f320432cc4141ee5c25a4e8a9dc60918aaad6208a989c9b4e61eb576dded72ee513de696ac3e019a2b3eab1ce2bf
-
SSDEEP
49152:EQFRHrmQG+yrY+FrO+FNrmQG+yrY+FrOLrmxrmQG+yrY+FrO+FNrmQG+yrY+FZN0:EcKCxIC90
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2892 vofwnk.exe -
Loads dropped DLL 2 IoCs
pid Process 2908 4bd3d3b40ef36ea45835e1adb0b9c98a.exe 2908 4bd3d3b40ef36ea45835e1adb0b9c98a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main vofwnk.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 vofwnk.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2892 vofwnk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2892 vofwnk.exe 2892 vofwnk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2892 2908 4bd3d3b40ef36ea45835e1adb0b9c98a.exe 15 PID 2908 wrote to memory of 2892 2908 4bd3d3b40ef36ea45835e1adb0b9c98a.exe 15 PID 2908 wrote to memory of 2892 2908 4bd3d3b40ef36ea45835e1adb0b9c98a.exe 15 PID 2908 wrote to memory of 2892 2908 4bd3d3b40ef36ea45835e1adb0b9c98a.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\vofwnk.exeC:\Users\Admin\AppData\Local\Temp\vofwnk.exe -run C:\Users\Admin\AppData\Local\Temp\4bd3d3b40ef36ea45835e1adb0b9c98a.exe1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2892
-
C:\Users\Admin\AppData\Local\Temp\4bd3d3b40ef36ea45835e1adb0b9c98a.exe"C:\Users\Admin\AppData\Local\Temp\4bd3d3b40ef36ea45835e1adb0b9c98a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908