Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 03:55
Behavioral task
behavioral1
Sample
dos.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dos.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
libeay32.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
libeay32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
ngdqsz.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
ngdqsz.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
ssleay32.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
ssleay32.dll
Resource
win10v2004-20240704-en
General
-
Target
dos.exe
-
Size
892KB
-
MD5
a59a2d3e5dda7aca6ec879263aa42fd3
-
SHA1
312d496ec90eb30d5319307d47bfef602b6b8c6c
-
SHA256
897b0d0e64cf87ac7086241c86f757f3c94d6826f949a1f0fec9c40892c0cecb
-
SHA512
852972ca4d7f9141ea56d3498388c61610492d36ea7d7af1b36d192d7e04dd6d9bc5830e0dcb0a5f8f55350d4d8aaac2869477686b03f998affbac6321a22030
-
SSDEEP
24576:bGzl9+a4Ne1nEFI56xU+0IdY2Zv952uetfbFEzP4UFhOt:b+tOWnEFZR0El0JEzQAh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3920-7-0x0000000010000000-0x0000000010149000-memory.dmp upx behavioral2/memory/3920-8-0x0000000008F10000-0x0000000008F5C000-memory.dmp upx behavioral2/memory/3920-9-0x0000000008F10000-0x0000000008F5C000-memory.dmp upx behavioral2/memory/3920-12-0x0000000008F10000-0x0000000008F5C000-memory.dmp upx behavioral2/memory/3920-11-0x0000000010000000-0x0000000010149000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3920 dos.exe 3920 dos.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use FormSuggest = "No" dos.exe Set value (str) \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FormSuggest Passwords = "No" dos.exe Set value (str) \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FormSuggest PW Ask = "No" dos.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3920 dos.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3920 dos.exe 3920 dos.exe 3920 dos.exe 3920 dos.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3920 dos.exe 3920 dos.exe 3920 dos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dos.exe"C:\Users\Admin\AppData\Local\Temp\dos.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4064,i,4226873509039249198,15952596839998010243,262144 --variations-seed-version --mojo-platform-channel-handle=1280 /prefetch:81⤵PID:2384