Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-05-2021 13:30
Static task
static1
Behavioral task
behavioral1
Sample
95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932c.exe
Resource
win7v20210410
General
-
Target
95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932c.exe
-
Size
249KB
-
MD5
47cbda60d9893c5fc4cd74ce8c2bbb1f
-
SHA1
ea131f3b305948e2b2f4007295f2518349d46c62
-
SHA256
95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932c
-
SHA512
c987ee8ebb2152f65085876975f39cb0812424594cf616b1fa1c3eacdbcd676fde414d9b6b05dbeb9ad332c3507c421265ffa7d1083fb44cbfd97b7637de4d07
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exeDesktopLayer.exepid process 2892 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe 2740 DesktopLayer.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe upx C:\Users\Admin\AppData\Local\Temp\95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx behavioral2/memory/2892-123-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxA75.tmp 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "327742811" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "164378765" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30886036" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{349A65F6-B487-11EB-A11C-D666EBA82C19} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "156410477" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30886036" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "156410477" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30886036" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "327791397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "327759405" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
DesktopLayer.exepid process 2740 DesktopLayer.exe 2740 DesktopLayer.exe 2740 DesktopLayer.exe 2740 DesktopLayer.exe 2740 DesktopLayer.exe 2740 DesktopLayer.exe 2740 DesktopLayer.exe 2740 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 200 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 200 iexplore.exe 200 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932c.exe95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exeDesktopLayer.exeiexplore.exedescription pid process target process PID 3172 wrote to memory of 2892 3172 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932c.exe 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe PID 3172 wrote to memory of 2892 3172 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932c.exe 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe PID 3172 wrote to memory of 2892 3172 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932c.exe 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe PID 2892 wrote to memory of 2740 2892 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe DesktopLayer.exe PID 2892 wrote to memory of 2740 2892 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe DesktopLayer.exe PID 2892 wrote to memory of 2740 2892 95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe DesktopLayer.exe PID 2740 wrote to memory of 200 2740 DesktopLayer.exe iexplore.exe PID 2740 wrote to memory of 200 2740 DesktopLayer.exe iexplore.exe PID 200 wrote to memory of 1964 200 iexplore.exe IEXPLORE.EXE PID 200 wrote to memory of 1964 200 iexplore.exe IEXPLORE.EXE PID 200 wrote to memory of 1964 200 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932c.exe"C:\Users\Admin\AppData\Local\Temp\95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exeC:\Users\Admin\AppData\Local\Temp\95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:200 CREDAT:82945 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
da18881ccaefeaa4942af9291cb34826
SHA1e4f33c21684bede05ccea60dd0767250ff2b3aba
SHA2561d736643af18fe45f74f67a68c3268b39e7dbd84aaaf46dba5e23e48e8402842
SHA5122420cf80794f4e74fb95934698714d4386e022d68c0c4e181d9d6e189bf3fab09f920e6e9128e423a1dbf357558bab628133d1084a7a306617c3a9c2461a5901
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
da18881ccaefeaa4942af9291cb34826
SHA1e4f33c21684bede05ccea60dd0767250ff2b3aba
SHA2561d736643af18fe45f74f67a68c3268b39e7dbd84aaaf46dba5e23e48e8402842
SHA5122420cf80794f4e74fb95934698714d4386e022d68c0c4e181d9d6e189bf3fab09f920e6e9128e423a1dbf357558bab628133d1084a7a306617c3a9c2461a5901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
ef07b2dc81b7fdcc01d8a9cce1261822
SHA1535c60f61ed56d43a349e92b86dd5204a1b61859
SHA2564f4d35e9bbae40c756cb82b60a2bbfe0dfe055b06ddf2494a953ce7565ff8eb6
SHA5121a26ee805d55b252567caec75c0b75ec5493aa1865b4fd8a1cf6b18972e2ffd82ba778b4a6a80ed85c9d016d841d26be11d4bc6f4bf8d8b512e7261dc7ad3fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
44e52cbb719701036716c8973b71d9ea
SHA1957f91416899fa53cf76540b015e92c00539809f
SHA256de657df41f3d08b21a6eb3721d5f11c9215f4fe00a639f6641158abee4c77f67
SHA512aac08434a92385a285b252f3ee6f13635f165c0e39b38cc7e2d9720b07a48bab06fb520b0a81351cdca4ee9117d789e4c68fdb4d66071732670d22fd49274c33
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1IEOMCZL.cookieMD5
2196967d4de2f6dfc0afa940b7a93ba8
SHA1cdc047bf720e167dc9428f7e0bffe917c342e399
SHA2562a399c49ffeb8206c90e05e3d643349aa6161056072e47a71f418d2c6d9863f3
SHA512efd53cdc6a194c39dfe307e044c8c1e347266736f862b6863e45ce18cc10b35bb9a8afa488092369b40ce6ee224b0fcb0bcbe458b90a7108ba1dea5e161b53b6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\KVU9YL6R.cookieMD5
e429c163fd0d586bc410333a0840c598
SHA15fee1a94d4d91d559f1279427d508ac3c247d2d9
SHA256a63587fdad0a27c1cc64b50e23d8ac5874efba55a2c1ca8a8296f119b6dabf26
SHA5123922c4cd98d415a3d5670821cfb5f966ffe77ef19bbba026763fe899b57d7450946c7561568e8bacad741b3f0b0c8f4513bfe1cd20a910d92c7cd8032a1510f5
-
C:\Users\Admin\AppData\Local\Temp\95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exeMD5
da18881ccaefeaa4942af9291cb34826
SHA1e4f33c21684bede05ccea60dd0767250ff2b3aba
SHA2561d736643af18fe45f74f67a68c3268b39e7dbd84aaaf46dba5e23e48e8402842
SHA5122420cf80794f4e74fb95934698714d4386e022d68c0c4e181d9d6e189bf3fab09f920e6e9128e423a1dbf357558bab628133d1084a7a306617c3a9c2461a5901
-
C:\Users\Admin\AppData\Local\Temp\95338461c9f48b1a58359ba44a9ae23f38e39a804be8bec143f94aa1b71e932cSrv.exeMD5
da18881ccaefeaa4942af9291cb34826
SHA1e4f33c21684bede05ccea60dd0767250ff2b3aba
SHA2561d736643af18fe45f74f67a68c3268b39e7dbd84aaaf46dba5e23e48e8402842
SHA5122420cf80794f4e74fb95934698714d4386e022d68c0c4e181d9d6e189bf3fab09f920e6e9128e423a1dbf357558bab628133d1084a7a306617c3a9c2461a5901
-
memory/200-121-0x0000000000000000-mapping.dmp
-
memory/200-124-0x00007FF900F20000-0x00007FF900F8B000-memory.dmpFilesize
428KB
-
memory/1964-128-0x0000000000000000-mapping.dmp
-
memory/2740-120-0x0000000000540000-0x0000000000541000-memory.dmpFilesize
4KB
-
memory/2740-117-0x0000000000000000-mapping.dmp
-
memory/2892-114-0x0000000000000000-mapping.dmp
-
memory/2892-123-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2892-122-0x00000000001E0000-0x00000000001EF000-memory.dmpFilesize
60KB
-
memory/3172-125-0x00000000005F0000-0x000000000073A000-memory.dmpFilesize
1.3MB