Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 18:01
Behavioral task
behavioral1
Sample
4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe
Resource
win10v2004-20240226-en
General
-
Target
4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe
-
Size
1.3MB
-
MD5
cc5fbd1e56505ab99e0661e16b8e9b3b
-
SHA1
410472792522b5656500aa4261fc5e6d93858384
-
SHA256
4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0
-
SHA512
1e148dd1f208e7ead2f0573edc24bb86fcdb15e7631ca2bfd7f4c5beee6dbd0341de942aa019ee91f795c4f22b6ff2dcfdfba348d06b2fe8e3df555c18509754
-
SSDEEP
24576:0U9QklrLjwi131W+I9fW+isuu14NIB/y6FcQk3:BQk9PwizWL9fWnq1p4Mk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4116-0-0x0000000000400000-0x0000000000735000-memory.dmp upx behavioral2/memory/4116-7-0x0000000000400000-0x0000000000735000-memory.dmp upx behavioral2/memory/4116-8-0x0000000000400000-0x0000000000735000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?28879" 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4116 wrote to memory of 4472 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 101 PID 4116 wrote to memory of 4472 4116 4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe"C:\Users\Admin\AppData\Local\Temp\4fcd708a33c621f295ddd7d29100ffa147a7addbd4d823dd72a05d00c783e6d0.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.baidu.com/s?wd=www.mtmdfz.org2⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=3972 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:4492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4672 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:1176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2108 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=4308 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:4656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=6004 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:3548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5484 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:3972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5296 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=5532 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:5096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6112 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:3012