Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe
Resource
win10v2004-20231215-en
General
-
Target
5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe
-
Size
880KB
-
MD5
748732cc5e370f4181e352a59ab42acc
-
SHA1
5dd9b41b9bfb1a9ef2766dc44da7da6870602977
-
SHA256
5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0
-
SHA512
ef51d4bd6b8590d9cfd0db6bf412cda94a8fae550f5d9bc199ee64e69e03d415fa63a0cd2029a21222a2edb277dd77cf95918881e15776a999b177f063a33c4e
-
SSDEEP
24576:q50ZOSZLnRGQ/bnEhwAY9QQR2Ta/0HvLLO/ntv6UCbgG:q5MOSvN/rY1LQR2c0PPenYUCbV
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2020 set thread context of 676 2020 5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe 87 PID 676 set thread context of 3520 676 calc.exe 41 PID 676 set thread context of 400 676 calc.exe 99 PID 400 set thread context of 3520 400 wextract.exe 41 -
description ioc Process Key created \Registry\User\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wextract.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 676 calc.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 676 calc.exe 3520 Explorer.EXE 3520 Explorer.EXE 400 wextract.exe 400 wextract.exe 400 wextract.exe 400 wextract.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3520 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2020 wrote to memory of 676 2020 5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe 87 PID 2020 wrote to memory of 676 2020 5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe 87 PID 2020 wrote to memory of 676 2020 5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe 87 PID 2020 wrote to memory of 676 2020 5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe 87 PID 2020 wrote to memory of 676 2020 5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe 87 PID 2020 wrote to memory of 676 2020 5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe 87 PID 3520 wrote to memory of 400 3520 Explorer.EXE 99 PID 3520 wrote to memory of 400 3520 Explorer.EXE 99 PID 3520 wrote to memory of 400 3520 Explorer.EXE 99 PID 400 wrote to memory of 1336 400 wextract.exe 105 PID 400 wrote to memory of 1336 400 wextract.exe 105 PID 400 wrote to memory of 1336 400 wextract.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe"C:\Users\Admin\AppData\Local\Temp\5e351a9f1fb3f62d980bd269a1ab3c652126861bf1d2ec773aa3be89980591a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SYSWOW64\calc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:676
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\wextract.exe"C:\Windows\SysWOW64\wextract.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1336
-
-