Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 13:28
Static task
static1
Behavioral task
behavioral1
Sample
Scanned Documents.exe
Resource
win7-20240220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Scanned Documents.exe
Resource
win10v2004-20240508-en
6 signatures
150 seconds
General
-
Target
Scanned Documents.exe
-
Size
892KB
-
MD5
92897efceeadf53315a22b740f20e1e5
-
SHA1
1fb78617996b7d1d7cd5715620c03a51284b6312
-
SHA256
5e0b09d1ef168d8efae50bf55632e623cc5bcda27cc27dea384cd90fbef373a4
-
SHA512
19f88ea4579dce1322a02b969f90a978f25111373509ee281854e158aa877c13857a836ff73206e919babc407e352bc554dda7c4b981aa3cd5caab4bfb4f98fe
-
SSDEEP
24576:EMYewzKiN5imjB5ZeBeuAZQ8WlFW6OUyayyq7rjBB+:EMYeYN5imjBC07ZQ8iFWsy0q7m
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 228 set thread context of 4060 228 Scanned Documents.exe 96 PID 4060 set thread context of 3412 4060 Scanned Documents.exe 56 PID 4060 set thread context of 4324 4060 Scanned Documents.exe 99 PID 4324 set thread context of 3412 4324 DWWIN.EXE 56 PID 4324 set thread context of 4908 4324 DWWIN.EXE 107 -
description ioc Process Key created \Registry\User\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 DWWIN.EXE -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4060 Scanned Documents.exe 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4060 Scanned Documents.exe 3412 Explorer.EXE 3412 Explorer.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE 4324 DWWIN.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3412 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 228 wrote to memory of 4060 228 Scanned Documents.exe 96 PID 228 wrote to memory of 4060 228 Scanned Documents.exe 96 PID 228 wrote to memory of 4060 228 Scanned Documents.exe 96 PID 228 wrote to memory of 4060 228 Scanned Documents.exe 96 PID 228 wrote to memory of 4060 228 Scanned Documents.exe 96 PID 228 wrote to memory of 4060 228 Scanned Documents.exe 96 PID 3412 wrote to memory of 4324 3412 Explorer.EXE 99 PID 3412 wrote to memory of 4324 3412 Explorer.EXE 99 PID 3412 wrote to memory of 4324 3412 Explorer.EXE 99 PID 4324 wrote to memory of 4908 4324 DWWIN.EXE 107 PID 4324 wrote to memory of 4908 4324 DWWIN.EXE 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\Scanned Documents.exe"C:\Users\Admin\AppData\Local\Temp\Scanned Documents.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\Scanned Documents.exe"C:\Users\Admin\AppData\Local\Temp\Scanned Documents.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4060
-
-
-
C:\Windows\SysWOW64\DWWIN.EXE"C:\Windows\SysWOW64\DWWIN.EXE"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4908
-
-