Analysis
-
max time kernel
107s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-05-2021 13:32
Static task
static1
Behavioral task
behavioral1
Sample
13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0a.exe
Resource
win7v20210410
General
-
Target
13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0a.exe
-
Size
542KB
-
MD5
cace70bb5d66a63c075aaade115ea984
-
SHA1
bbbd2950f54acab4039858adef7344ffcf8aaba8
-
SHA256
13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0a
-
SHA512
894e3dbdec47ba8f6f7e043247133d0a4555bdde23a6a8c02d45095796f7df16d2ba181249711b44deb8d39af32bfd696523b09a69716165389946fe3f75adc4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exeDesktopLayer.exepid process 1360 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe 1440 DesktopLayer.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe upx C:\Users\Admin\AppData\Local\Temp\13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx behavioral2/memory/1360-124-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exedescription ioc process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px1274.tmp 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3148477826" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "327791695" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3140352464" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E67A8639-B487-11EB-A11C-F6AF56FFA818} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "327759703" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3140352464" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "327743109" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30886036" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30886036" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30886036" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
DesktopLayer.exepid process 1440 DesktopLayer.exe 1440 DesktopLayer.exe 1440 DesktopLayer.exe 1440 DesktopLayer.exe 1440 DesktopLayer.exe 1440 DesktopLayer.exe 1440 DesktopLayer.exe 1440 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 184 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 184 iexplore.exe 184 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0a.exe13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exeDesktopLayer.exeiexplore.exedescription pid process target process PID 3768 wrote to memory of 1360 3768 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0a.exe 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe PID 3768 wrote to memory of 1360 3768 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0a.exe 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe PID 3768 wrote to memory of 1360 3768 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0a.exe 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe PID 1360 wrote to memory of 1440 1360 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe DesktopLayer.exe PID 1360 wrote to memory of 1440 1360 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe DesktopLayer.exe PID 1360 wrote to memory of 1440 1360 13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe DesktopLayer.exe PID 1440 wrote to memory of 184 1440 DesktopLayer.exe iexplore.exe PID 1440 wrote to memory of 184 1440 DesktopLayer.exe iexplore.exe PID 184 wrote to memory of 1708 184 iexplore.exe IEXPLORE.EXE PID 184 wrote to memory of 1708 184 iexplore.exe IEXPLORE.EXE PID 184 wrote to memory of 1708 184 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0a.exe"C:\Users\Admin\AppData\Local\Temp\13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exeC:\Users\Admin\AppData\Local\Temp\13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:184 CREDAT:82945 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
da18881ccaefeaa4942af9291cb34826
SHA1e4f33c21684bede05ccea60dd0767250ff2b3aba
SHA2561d736643af18fe45f74f67a68c3268b39e7dbd84aaaf46dba5e23e48e8402842
SHA5122420cf80794f4e74fb95934698714d4386e022d68c0c4e181d9d6e189bf3fab09f920e6e9128e423a1dbf357558bab628133d1084a7a306617c3a9c2461a5901
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
da18881ccaefeaa4942af9291cb34826
SHA1e4f33c21684bede05ccea60dd0767250ff2b3aba
SHA2561d736643af18fe45f74f67a68c3268b39e7dbd84aaaf46dba5e23e48e8402842
SHA5122420cf80794f4e74fb95934698714d4386e022d68c0c4e181d9d6e189bf3fab09f920e6e9128e423a1dbf357558bab628133d1084a7a306617c3a9c2461a5901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
ef07b2dc81b7fdcc01d8a9cce1261822
SHA1535c60f61ed56d43a349e92b86dd5204a1b61859
SHA2564f4d35e9bbae40c756cb82b60a2bbfe0dfe055b06ddf2494a953ce7565ff8eb6
SHA5121a26ee805d55b252567caec75c0b75ec5493aa1865b4fd8a1cf6b18972e2ffd82ba778b4a6a80ed85c9d016d841d26be11d4bc6f4bf8d8b512e7261dc7ad3fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
34a87c5ea674ec50320ba46f3fe6ab66
SHA1b37be336ef0baf74c40f9079d4f26a4179be98c3
SHA2564b725fa6a431970aa827fa0a2587bcdae096ff7af1d64a784dfc75c6709707b8
SHA51260d93be4d731f2d68d677dc1513ff8229278368a4a3d75b69e036d587746eea82167fa75f220ddd96b0bd0620357590ab0e0315b352d4bceb9558af2d05724aa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5WNADUN7.cookieMD5
8a4e2434f82d626cd1d6eb32ccb8dd5a
SHA1064ed16deaed76061acc88b11b0b4563ff055c71
SHA25618e58769b11a4169711cbeb30b9de8cca57dbf1b71a1333198593acaf5bb430c
SHA5126d7d3d92b3769d9f06d17ba4bb73be6e3c30c4206c732b4048d02c58a646420e297b1bb551488bdfb39bb1068b4019441c7f419f9c4248b78e809f9e37a6df46
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\NWFB271E.cookieMD5
d184473e403d2646620ba103817a2ec4
SHA1c82cdfec5099a550c0c2ab26fccd157716457614
SHA25616a00dac76f0ea34751345600b89b1bd1c0e52b4f513f190415c5304576dd5fa
SHA512772ef8014d39138cb9f3a739495bf058befa024ff0d3dc0fa6f3daa5cfee7e2ecc57066fbcbba9d1329001c1d7aaf130966d2d13a0f72ae825a5698ebf59a863
-
C:\Users\Admin\AppData\Local\Temp\13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exeMD5
da18881ccaefeaa4942af9291cb34826
SHA1e4f33c21684bede05ccea60dd0767250ff2b3aba
SHA2561d736643af18fe45f74f67a68c3268b39e7dbd84aaaf46dba5e23e48e8402842
SHA5122420cf80794f4e74fb95934698714d4386e022d68c0c4e181d9d6e189bf3fab09f920e6e9128e423a1dbf357558bab628133d1084a7a306617c3a9c2461a5901
-
C:\Users\Admin\AppData\Local\Temp\13baa9d117db2adc7c25cd88e4174882fa4db731989c9f495dc32102c53ebe0aSrv.exeMD5
da18881ccaefeaa4942af9291cb34826
SHA1e4f33c21684bede05ccea60dd0767250ff2b3aba
SHA2561d736643af18fe45f74f67a68c3268b39e7dbd84aaaf46dba5e23e48e8402842
SHA5122420cf80794f4e74fb95934698714d4386e022d68c0c4e181d9d6e189bf3fab09f920e6e9128e423a1dbf357558bab628133d1084a7a306617c3a9c2461a5901
-
memory/184-122-0x00007FFCEE4A0000-0x00007FFCEE50B000-memory.dmpFilesize
428KB
-
memory/184-121-0x0000000000000000-mapping.dmp
-
memory/1360-123-0x00000000001E0000-0x00000000001EF000-memory.dmpFilesize
60KB
-
memory/1360-124-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1360-114-0x0000000000000000-mapping.dmp
-
memory/1440-120-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1440-117-0x0000000000000000-mapping.dmp
-
memory/1708-128-0x0000000000000000-mapping.dmp
-
memory/3768-125-0x0000000000490000-0x000000000053E000-memory.dmpFilesize
696KB