Analysis
-
max time kernel
132s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe
Resource
win10v2004-20240426-en
General
-
Target
9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe
-
Size
7.4MB
-
MD5
f7a1eb5573e82e6d54da2d3a19f42d2c
-
SHA1
292bd96bc7e2bf7b26ebc382a26310b042d47980
-
SHA256
9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94
-
SHA512
6998479736b12fd120a33faa510fc043e3b5ab5786dd891c33c2cec8042cb0feefba2823ea163fec42c2a2dc218d6c8dc77679e42acb5d5fc0b5fe8ec1f725de
-
SSDEEP
196608:IFHPAcBw/lSxmidLRVokE2ZEFLOyomFHKnPXFLOyomFHKnP:IFHPFq/ulyFIF
Malware Config
Signatures
-
Modifies registry class 19 IoCs
Processes:
9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9E9C2E~1.EXE \"%1\"" 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9E9C2E~1.EXE /p \"%1\"" 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9E9C2E~1.EXE /pt \"%1\" \"%2\" \"%3\" \"%4\"" 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell\open\command 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell\open 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.HLB;.HLT\ = "HCTLableEditor.Document" 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell\print\command 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell\printto\command 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.HLB;.HLT 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\AppUserModelID = "HCTLableEditor.AppID.NoVersion" 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\DefaultIcon 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9E9C2E~1.EXE,1" 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.HLB;.HLT\ShellNew 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.HLB;.HLT\ShellNew\NullFile 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\ = "HCTLableEditor.Document" 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell\print 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HCTLableEditor.Document\shell\printto 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exepid process 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exepid process 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exepid process 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe 1524 9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe"C:\Users\Admin\AppData\Local\Temp\9e9c2e3c6ff7e3a78ecca837f42561c22362da821ba5506b17a307cb1afade94.exe"1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1524