Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
inquiry.exe
Resource
win7-20231129-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
inquiry.exe
Resource
win10v2004-20240426-en
7 signatures
150 seconds
General
-
Target
inquiry.exe
-
Size
876KB
-
MD5
beb116406043adf5d6fe5c688eae6d15
-
SHA1
f61c10b86ddad9dfde65ec4a923fedb253d52021
-
SHA256
5228429e6eefc6336ac71c6f0c7c8fbd2770451057a951657e338d1cdd5d6c80
-
SHA512
0005dc3a469a0d88208b9846611a13cefa7e996ffb7a12cd29f847b8c882eaf31a687e2e138e43379fbbb3a5dfe5174c4bbf58a17893ed116142ac1f48f40d25
-
SSDEEP
24576:jw4bjw4bBQ1mvhl5zJWunpgghRD7X84HYFZ7s:jw4bjw4bBQ+FWWpgUVHSBs
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 716 set thread context of 3344 716 inquiry.exe 97 PID 3344 set thread context of 3388 3344 RegSvcs.exe 56 PID 3344 set thread context of 1296 3344 RegSvcs.exe 100 PID 1296 set thread context of 3388 1296 iexpress.exe 56 PID 1296 set thread context of 2944 1296 iexpress.exe 108 -
description ioc Process Key created \Registry\User\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 iexpress.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 716 inquiry.exe 716 inquiry.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 3344 RegSvcs.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3344 RegSvcs.exe 3388 Explorer.EXE 3388 Explorer.EXE 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe 1296 iexpress.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 716 inquiry.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3388 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 716 wrote to memory of 3344 716 inquiry.exe 97 PID 716 wrote to memory of 3344 716 inquiry.exe 97 PID 716 wrote to memory of 3344 716 inquiry.exe 97 PID 716 wrote to memory of 3344 716 inquiry.exe 97 PID 716 wrote to memory of 3344 716 inquiry.exe 97 PID 716 wrote to memory of 3344 716 inquiry.exe 97 PID 3388 wrote to memory of 1296 3388 Explorer.EXE 100 PID 3388 wrote to memory of 1296 3388 Explorer.EXE 100 PID 3388 wrote to memory of 1296 3388 Explorer.EXE 100 PID 1296 wrote to memory of 2944 1296 iexpress.exe 108 PID 1296 wrote to memory of 2944 1296 iexpress.exe 108
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\inquiry.exe"C:\Users\Admin\AppData\Local\Temp\inquiry.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3344
-
-
-
C:\Windows\SysWOW64\iexpress.exe"C:\Windows\SysWOW64\iexpress.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2944
-
-