Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
712f610488cf31d902c8349324a588f793694021f447f54356e71f91cb409fe7.chm
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
712f610488cf31d902c8349324a588f793694021f447f54356e71f91cb409fe7.chm
Resource
win10v2004-20240226-en
General
-
Target
712f610488cf31d902c8349324a588f793694021f447f54356e71f91cb409fe7.chm
-
Size
210KB
-
MD5
3b1be164b9870a25c71e3ebe698bc5f3
-
SHA1
a7356370baf6a096db1ead38199d303d569401b4
-
SHA256
712f610488cf31d902c8349324a588f793694021f447f54356e71f91cb409fe7
-
SHA512
7f1fba9c267a9338c99b411fc230fa6415d11739ffd8a8580a09b22193dc51ad4b8106ca7718ac959568434213a19036f6194bf70e624cd886c9ad1df92e30ef
-
SSDEEP
6144:zd9ya+wsr86GV5QdvDz+FPFrXU1v/gbJyMPne:J9ylwsr856dvHqPFrXU1v/g9HPe
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main hh.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2460 hh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2460 hh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2460 hh.exe 2460 hh.exe
Processes
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\712f610488cf31d902c8349324a588f793694021f447f54356e71f91cb409fe7.chm1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2460