Analysis
-
max time kernel
77s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 10:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f5e9adb0d9644f4df5e42c3ff5a8e1c9478c049139a63ddc9d2b53f69d6dcbb5.exe
Resource
win7-20240508-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
f5e9adb0d9644f4df5e42c3ff5a8e1c9478c049139a63ddc9d2b53f69d6dcbb5.exe
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
f5e9adb0d9644f4df5e42c3ff5a8e1c9478c049139a63ddc9d2b53f69d6dcbb5.exe
-
Size
11KB
-
MD5
8e2d9a024dfc37be8f1da03b801018e1
-
SHA1
05f35a9cc2ca7a67fd08e86039a072e4a12c16a9
-
SHA256
f5e9adb0d9644f4df5e42c3ff5a8e1c9478c049139a63ddc9d2b53f69d6dcbb5
-
SHA512
c30715248c575398f8412ebdb6e60c1c5f690a7d813628850f9be3118d9ea0a9ea4ea5eb9f06c6a718641fb9d8a9b2f50fc25c126313b7f583ca47e5e0c13a31
-
SSDEEP
96:OD2ZMyh7diytBkA21JMjOklONLSxxGf/I:Odu7ltBkAwJMKklO9IxY/
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000006633b135c95c54191e4d28dd78c8374000000000200000000001066000000010000200000000f092de414497edcfdcaf17c9377cee30a9c056e10c59d27e63a8dee2b6fcb02000000000e8000000002000020000000457c8ad5530387c94556e16f264328b4fc2dc71c68a940311384a6f0f22ea5c720000000a330aa64ac47c2b8df55630711b03d886009a3dea77271fb6ed84561e79178fb40000000032062e1497dbac3e15e7145a65072a9232a6f6bce6ce14edf6e4d971e91f0e31d7d61cdb7be6b925bc319a96447d354dcdd2dbfb6dc30e907c2ba9aefc388e4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0785788b4bcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807d5e88b4bcda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424350474" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000006633b135c95c54191e4d28dd78c837400000000020000000000106600000001000020000000a4fcf678212fc889a1f78622da2776ccdb25862e8a40167e2d7b8f2dffa24e8a000000000e8000000002000020000000416781f4b6878a193b3d3855ec3e6311d258e10e2720141a871c828fc373ed35200000002ffa8c4ac9e38978f6fa62e181f35d195ea8e906deadc972564ebaefdaa7330f400000005270181b7e670fac92e8258a230858283cf5452e3fe55b6d3005042031a3a11963a42fc9a279858ab8c6a9685ea665b032483c35f07b1c16f9a7d5a62aa81bb5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A4F4290C-28A7-11EF-A084-E20E9B62A9C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1280 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1280 iexplore.exe 1280 iexplore.exe 3380 IEXPLORE.EXE 3380 IEXPLORE.EXE 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1280 wrote to memory of 3380 1280 iexplore.exe 84 PID 1280 wrote to memory of 3380 1280 iexplore.exe 84 PID 1280 wrote to memory of 3380 1280 iexplore.exe 84 PID 1280 wrote to memory of 1180 1280 iexplore.exe 86 PID 1280 wrote to memory of 1180 1280 iexplore.exe 86 PID 1280 wrote to memory of 1180 1280 iexplore.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e9adb0d9644f4df5e42c3ff5a8e1c9478c049139a63ddc9d2b53f69d6dcbb5.exe"C:\Users\Admin\AppData\Local\Temp\f5e9adb0d9644f4df5e42c3ff5a8e1c9478c049139a63ddc9d2b53f69d6dcbb5.exe"1⤵PID:1600
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4016
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3380
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:82946 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1180
-