Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 20:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe
-
Size
4.7MB
-
MD5
a3a8a1784f7f6d2b63765a569fdd0274
-
SHA1
463001f3a1d158474188b32fd0700ef2c28f7811
-
SHA256
c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9
-
SHA512
a9b8855de539b8f028f37e23dc36353c35f8b8695c1251f8323b0ea07c638b57dc6ec63efe2289df912287e8913c49390451376d7a9b278e752eae1c7fb48325
-
SSDEEP
98304:24fA0POUTfam0bU3WvpHhPNlH3tUvkJ6k:24fQWNqVplHC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2220-6-0x0000000000260000-0x000000000026B000-memory.dmp upx behavioral1/memory/2220-7-0x0000000000260000-0x000000000026B000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/?28879" c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?28879" c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2220 c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe 2220 c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe 2220 c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe 2220 c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 484 Process not Found 484 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2220 c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe 2220 c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe"C:\Users\Admin\AppData\Local\Temp\c74cd027da659dae5c39b61182c04ab6f33959017d78bb95d7db5023f0d844a9.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2220