Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-02-2024 19:36
Behavioral task
behavioral1
Sample
7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe
Resource
win10v2004-20231215-en
General
-
Target
7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe
-
Size
4.9MB
-
MD5
2249078412fe0aca0cb42019a3c21fcc
-
SHA1
d869b126ad9e40540e9d18f8a2bcdeb44dbb67f0
-
SHA256
7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007
-
SHA512
a3d744e2dd9453888d26b5c23ded7dee9193da05d319aa32f8f0ad7d81afbb5248674e2789c3013432f9abc33b42ee36863925964c0394d1b5081c93b781e155
-
SSDEEP
98304:3R8EftRdtsZ9XiTe5GrlEMoRhIt7V2vgtnWyR+BH0e8h20y/pWVrzXoX8mhYTL/v:3Vd1XosugCB8U/erA8LL/YoYCe+pG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2300-0-0x0000000000400000-0x0000000000B55000-memory.dmp upx behavioral1/memory/2300-8700-0x0000000000400000-0x0000000000B55000-memory.dmp upx behavioral1/memory/2300-8701-0x0000000000320000-0x000000000032B000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
pid Process 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/?28879" 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Start Page 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?28879" 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 468 Process not Found 468 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe 2300 7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe"C:\Users\Admin\AppData\Local\Temp\7129615f2ec37bce31ca6d0dccd743a0733fa0a64cdf68d328ecfc7a18be3007.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2300