Analysis
-
max time kernel
158s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
INQ J312R.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
INQ J312R.exe
Resource
win10v2004-20231215-en
General
-
Target
INQ J312R.exe
-
Size
1.2MB
-
MD5
015dbff467968a31d207dfc65eab7a2a
-
SHA1
172f2a10a150a1d45885e60b93e55ac1ad9d1ca4
-
SHA256
ee49b4bfcca622cb2f82b2b61c5c3587fc18c1f9d663aa30cf579eaf409ba2ea
-
SHA512
e39dae1b7680148b4ed8073083f97c03a5fb05ce62bc5400f0fdce836b341b19726300e39f33b9ffd929ae4f0980708c4d8c00347dbf48a08e051f2c7d07fd57
-
SSDEEP
24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8aezIWgzRGygKS2RufvA:mTvC/MTQYxsWR7ae0WIM92Uf
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4236 set thread context of 4072 4236 INQ J312R.exe 91 PID 4072 set thread context of 4236 4072 INQ J312R.exe 88 PID 4072 set thread context of 1688 4072 INQ J312R.exe 93 PID 1688 set thread context of 3588 1688 shutdown.exe 52 -
description ioc Process Key created \Registry\User\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 shutdown.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4072 INQ J312R.exe 4072 INQ J312R.exe 4072 INQ J312R.exe 4072 INQ J312R.exe 4072 INQ J312R.exe 4072 INQ J312R.exe 4072 INQ J312R.exe 4072 INQ J312R.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3588 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4236 INQ J312R.exe 4072 INQ J312R.exe 4236 INQ J312R.exe 4236 INQ J312R.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe 1688 shutdown.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3588 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4072 4236 INQ J312R.exe 91 PID 4236 wrote to memory of 4072 4236 INQ J312R.exe 91 PID 4236 wrote to memory of 4072 4236 INQ J312R.exe 91 PID 4236 wrote to memory of 4072 4236 INQ J312R.exe 91 PID 4236 wrote to memory of 1688 4236 INQ J312R.exe 93 PID 4236 wrote to memory of 1688 4236 INQ J312R.exe 93 PID 4236 wrote to memory of 1688 4236 INQ J312R.exe 93 PID 1688 wrote to memory of 408 1688 shutdown.exe 104 PID 1688 wrote to memory of 408 1688 shutdown.exe 104 PID 1688 wrote to memory of 408 1688 shutdown.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\INQ J312R.exe"C:\Users\Admin\AppData\Local\Temp\INQ J312R.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\INQ J312R.exe"C:\Users\Admin\AppData\Local\Temp\INQ J312R.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4072
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\SysWOW64\shutdown.exe"3⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"4⤵PID:408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD568cab616cb1d2800c6c70b70f76da7e2
SHA149e6eeb08d8b3b42d61520aea47a4b00d923a0f4
SHA256b9d301038978f3da423b7878277c5d76a47261a9edc9c2cdc449c0e0e684686d
SHA512ece30d3ddeb8e819ff319329424f1fb87e02d752c518edfd31faba27404e3c0bd523f0879ac0c2217470ef6d4539a2356f4c387e8d7a0c7acaf116ffedded5bd