Analysis Overview
SHA256
322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4
Threat Level: Shows suspicious behavior
The file 322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4 was found to be: Shows suspicious behavior.
Malicious Activity Summary
UPX packed file
Enumerates physical storage devices
Program crash
Unsigned PE
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-07 11:40
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-07 11:40
Reported
2024-06-07 11:42
Platform
win7-20240221-en
Max time kernel
141s
Max time network
150s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe | N/A |
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe
"C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | hoiucvltk2005.net | udp |
| US | 8.8.8.8:53 | dl.hoiucvltk2005.net | udp |
| VN | 14.225.250.82:80 | dl.hoiucvltk2005.net | tcp |
| VN | 14.225.250.82:80 | dl.hoiucvltk2005.net | tcp |
| US | 8.8.8.8:53 | hoiucvltk2005.me | udp |
| VN | 14.225.250.82:80 | hoiucvltk2005.me | tcp |
| VN | 14.225.250.82:80 | hoiucvltk2005.me | tcp |
| VN | 14.225.250.82:80 | hoiucvltk2005.me | tcp |
| VN | 14.225.250.82:80 | hoiucvltk2005.me | tcp |
| US | 8.8.8.8:53 | analytics.hoiucvltk2005.net | udp |
| VN | 14.225.250.82:80 | analytics.hoiucvltk2005.net | tcp |
Files
memory/1924-0-0x0000000000400000-0x00000000007A7000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\temp\filelist.dat
| MD5 | 865136977962fea2dd67931c14bf60b5 |
| SHA1 | bebafc23d7b2e8cd0a8bcfb86422f933d182ae6f |
| SHA256 | b97a19f9ae7247b42dc4614be0b72a6bb4ba6bd057bb9eedd901a38d8f4cf44f |
| SHA512 | 46581473cfcab33020e00ccc20fd9fbd90f31763303ec391f6ded8d7ee0083320b5149651b366e3e0fcfc56e4b3ab355647093e840d9dbc7c3487194e5cef6bf |
memory/1924-1252-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1257-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1260-0x0000000006540000-0x0000000006560000-memory.dmp
memory/1924-1261-0x0000000006540000-0x0000000006560000-memory.dmp
memory/1924-1262-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1263-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1264-0x0000000006540000-0x0000000006560000-memory.dmp
memory/1924-1265-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1266-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1267-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1268-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1269-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1270-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1271-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1272-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1273-0x0000000000400000-0x00000000007A7000-memory.dmp
memory/1924-1274-0x0000000000400000-0x00000000007A7000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-07 11:40
Reported
2024-06-07 11:42
Platform
win10v2004-20240508-en
Max time kernel
133s
Max time network
126s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe |
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe
"C:\Users\Admin\AppData\Local\Temp\322990fa4bd60b0d3a2df87c3543f82bc5e3825f8357eb27a2d80aab0969afa4.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5064 -ip 5064
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 2124
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4040,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | hoiucvltk2005.net | udp |
| US | 8.8.8.8:53 | dl.hoiucvltk2005.net | udp |
| VN | 14.225.250.82:80 | dl.hoiucvltk2005.net | tcp |
| VN | 14.225.250.82:80 | dl.hoiucvltk2005.net | tcp |
| VN | 14.225.250.82:80 | dl.hoiucvltk2005.net | tcp |
| US | 8.8.8.8:53 | hoiucvltk2005.me | udp |
| VN | 14.225.250.82:80 | hoiucvltk2005.me | tcp |
| VN | 14.225.250.82:80 | hoiucvltk2005.me | tcp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.250.225.14.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 100.58.20.217.in-addr.arpa | udp |
| VN | 14.225.250.82:80 | hoiucvltk2005.me | tcp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| NL | 23.62.61.107:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 226.162.46.104.in-addr.arpa | udp |
Files
memory/5064-0-0x0000000000400000-0x00000000007A7000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\temp\filelist.dat
| MD5 | 865136977962fea2dd67931c14bf60b5 |
| SHA1 | bebafc23d7b2e8cd0a8bcfb86422f933d182ae6f |
| SHA256 | b97a19f9ae7247b42dc4614be0b72a6bb4ba6bd057bb9eedd901a38d8f4cf44f |
| SHA512 | 46581473cfcab33020e00ccc20fd9fbd90f31763303ec391f6ded8d7ee0083320b5149651b366e3e0fcfc56e4b3ab355647093e840d9dbc7c3487194e5cef6bf |
memory/5064-37-0x0000000000400000-0x00000000007A7000-memory.dmp