Analysis
-
max time kernel
123s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
14-12-2021 08:15
Static task
static1
Behavioral task
behavioral1
Sample
Object.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Object.exe
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
Oleacc.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
Oleacc.dll
Resource
win10-en-20211208
Behavioral task
behavioral5
Sample
libeay32.dll
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
libeay32.dll
Resource
win10-en-20211208
Behavioral task
behavioral7
Sample
ssleay32.dll
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
ssleay32.dll
Resource
win10-en-20211208
General
-
Target
Object.exe
-
Size
1.2MB
-
MD5
06b1b36cd7c59cf46cd7f5d661c4da6f
-
SHA1
ed225d67e410c4c70a205fe969def346035ada72
-
SHA256
0d1882db000f8898f7598e87cefd2f1f7689524ee10b406870d1ae7a92ee775b
-
SHA512
6e448b9e44b57f05cc760c313d4898751afc23b2db14c4f981880e0183af67944d92ab0ad946b52d365e17ba5f2a6b2a97097450ac8a0e5c636f1c43a21d7c3a
Malware Config
Signatures
-
Detect Numando Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/368-115-0x0000000000B20000-0x000000000142F000-memory.dmp family_numando -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Object.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Object.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Object.exe" Object.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "47" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "75" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D59AB23-5B13-11EC-9231-6E964C5F562A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "47" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "75" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "28" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "841" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "841" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "75" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "841" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "28" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\ = "28" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "47" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net\Total = "9" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\websetnet.net IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Object.exepid process 368 Object.exe 368 Object.exe 368 Object.exe 368 Object.exe 368 Object.exe 368 Object.exe 368 Object.exe 368 Object.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 764 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 764 iexplore.exe 764 iexplore.exe 3424 IEXPLORE.EXE 3424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
Object.exeiexplore.exedescription pid process target process PID 368 wrote to memory of 764 368 Object.exe iexplore.exe PID 368 wrote to memory of 764 368 Object.exe iexplore.exe PID 764 wrote to memory of 3424 764 iexplore.exe IEXPLORE.EXE PID 764 wrote to memory of 3424 764 iexplore.exe IEXPLORE.EXE PID 764 wrote to memory of 3424 764 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Object.exe"C:\Users\Admin\AppData\Local\Temp\Object.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %1 "https://bit.ly/3DvoVCc"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD5c6811946b9694670de5f75aaf166d62b
SHA176ba97e32d8ea96aa9d3eac166da08bc9d47d275
SHA256ca091ead302426a084c41aa611582fe645b9ab8b0c72471c69b48bf6319a4bdb
SHA512b45674e75601fb1f9ecb85066e99855b4e144aa2a36fe13e096325e31c8a87eca859718d2860f56189909475622038fe91796aa289ad65ff0b90185d23c976cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD5874a353f887eb5313317664dc4c2e7ae
SHA15894788d61446c0641679564282e6e247deced1c
SHA256778f0e3a3707b383976d47c8f0e8050c1b153dc749decf61ba90c1df63074332
SHA512f8fcb4e1563a7d97aee9cb5bf79b28f60375a03c59d13f044ee75e6afd20a7187d57ee2925cfa4f6d55c1348557d7bbda7f7f4d63fab1f93230eea43e889b6e7
-
MD5
da79f078560df897cb2c63aba450982d
SHA1d96608cb061e6a96ee242bd962f72e7c7fe3b409
SHA256c6da1bc1f872d4345a26c98aafe2d639599b6a9a66bb359f9f22accb0a8311c1
SHA5128cc0ab272192f67074c76670415aae54cd7b15f29a3428a570f0a80af8b1ead7897ec58fa9247d2fae4a6e4d72df24fab5502cada0dbb771ceba40d14f7bafbd