Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-05-2021 02:31
Static task
static1
Behavioral task
behavioral1
Sample
382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe
Resource
win7v20210410
General
-
Target
382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe
-
Size
193KB
-
MD5
6b14303e1bce59b6ec5d316588a11667
-
SHA1
ca1e99756646f0102f4acc588e964f4a9e35c35b
-
SHA256
382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1
-
SHA512
f3f10568a749c7a571e3c21f52366b1293170d3ec70040bc7ed7757fa700f4975aef367e18058312d8ca20c4b8f7225b5bbc6fffc9dec71fd1fb6cf7ffb5987c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
DesktopLayer.exepid process 2660 DesktopLayer.exe -
Processes:
resource yara_rule C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx C:\Program Files (x86)\Microsoft\DesktopLayer.exe upx behavioral2/memory/512-120-0x0000000000400000-0x000000000043F000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxFCBA.tmp 382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe -
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "370158574" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "327869157" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "380003404" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "370158574" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30886217" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "327837165" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30886217" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "327820572" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30886217" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{415C5C51-B53C-11EB-A11C-7EF74584969E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
DesktopLayer.exepid process 2660 DesktopLayer.exe 2660 DesktopLayer.exe 2660 DesktopLayer.exe 2660 DesktopLayer.exe 2660 DesktopLayer.exe 2660 DesktopLayer.exe 2660 DesktopLayer.exe 2660 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 192 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 192 iexplore.exe 192 iexplore.exe 1356 IEXPLORE.EXE 1356 IEXPLORE.EXE 1356 IEXPLORE.EXE 1356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exeDesktopLayer.exeiexplore.exedescription pid process target process PID 512 wrote to memory of 2660 512 382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe DesktopLayer.exe PID 512 wrote to memory of 2660 512 382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe DesktopLayer.exe PID 512 wrote to memory of 2660 512 382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe DesktopLayer.exe PID 2660 wrote to memory of 192 2660 DesktopLayer.exe iexplore.exe PID 2660 wrote to memory of 192 2660 DesktopLayer.exe iexplore.exe PID 192 wrote to memory of 1356 192 iexplore.exe IEXPLORE.EXE PID 192 wrote to memory of 1356 192 iexplore.exe IEXPLORE.EXE PID 192 wrote to memory of 1356 192 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe"C:\Users\Admin\AppData\Local\Temp\382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:192 CREDAT:82945 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
6b14303e1bce59b6ec5d316588a11667
SHA1ca1e99756646f0102f4acc588e964f4a9e35c35b
SHA256382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1
SHA512f3f10568a749c7a571e3c21f52366b1293170d3ec70040bc7ed7757fa700f4975aef367e18058312d8ca20c4b8f7225b5bbc6fffc9dec71fd1fb6cf7ffb5987c
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exeMD5
6b14303e1bce59b6ec5d316588a11667
SHA1ca1e99756646f0102f4acc588e964f4a9e35c35b
SHA256382693e103272f575075d138544d2d2a2c08344ded01621035b2ad4b3adeb5d1
SHA512f3f10568a749c7a571e3c21f52366b1293170d3ec70040bc7ed7757fa700f4975aef367e18058312d8ca20c4b8f7225b5bbc6fffc9dec71fd1fb6cf7ffb5987c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
57010df1ded674ce061f8af29a2e6fbb
SHA183e50ef272059dc3fab93e694d5e220dc48bf0c4
SHA25668492169f14b36562d813f4ae7506f4b324b85f0e6aec352a37faba29b289616
SHA512211ecb686dec8e8dd57cc8aeebdb8953f81aa56eebec9b463df4d41d98942317ed001ae5ffc9cc0c3ce5c542317cd0838447b885016697411b99f68190bd430b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
45c6b61f352c5c871adeaee3cd4d89e2
SHA19dad7189df50eaa8d3f07b265a097105a920cff7
SHA256e7769a861fbd605a51f6bf4997f36f2dcf7c061d46dcf75bd26fc0af37362483
SHA512eee6c0a13a3538d85bd03e635282ce21a6605c805f3eb2acf8709a5e2beb8f4ec21d6ec0eb578e30f9e15e337884d719f602938715b9cf45e70f95dc93d31720
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\RJ5C141L.cookieMD5
870cb9789308704d0b423c764813058d
SHA113517b0e8d56cb3638bde96bfd113d89a0b74b3e
SHA256017f4afb664ea306a63ae6ea828b4f92cc0c66ba45fbbdaf1a45cc79a163a39b
SHA512da048e879ccd48a55bec13835d977372feb77c18cdcb6df839f7d6dd3c83166800ab94f721bb3eef606e7262944a4afc196e3beb07019094579e68f301abccee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SRZHW5DD.cookieMD5
b726193aa2cca4018cdef6df9c5e2b1e
SHA15a791a4d4149ca3a001744e31641bcf3e41b87f4
SHA256891a36964c3d123e9de7ab3f4b466c49ba26b4d812361e1b9a82f538cdff5e4e
SHA512aec096334884d9bc4419e673474277fd817b6aee15e584a492e4ab8c5c895280e015ff31c92eeda89ae14d25753c812dbe3faec89536de578d7fe18142bc4d56
-
memory/192-118-0x0000000000000000-mapping.dmp
-
memory/192-123-0x00007FF97CBF0000-0x00007FF97CC5B000-memory.dmpFilesize
428KB
-
memory/512-120-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/512-119-0x00000000001E0000-0x00000000001EF000-memory.dmpFilesize
60KB
-
memory/1356-124-0x0000000000000000-mapping.dmp
-
memory/2660-114-0x0000000000000000-mapping.dmp
-
memory/2660-117-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB