Analysis
-
max time kernel
4294182s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
18-03-2022 15:11
Static task
static1
Behavioral task
behavioral1
Sample
SECURE_D.exe
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SECURE_D.exe
Resource
win10-20220223-en
windows10_x64
0 signatures
0 seconds
General
-
Target
SECURE_D.exe
-
Size
1.1MB
-
MD5
c5c552951da0e502f8aaf0881e2d26bc
-
SHA1
e279549491a1a76105b0a1d5b258e66de16bd956
-
SHA256
bda7803bc6a630ed5997870eb0b102e590d6f584b11699fb76781564debe9921
-
SHA512
e8d414bf468adfdf8c704e667bc8425ddbb02bc69fbe8cf48bd163c515bbdcab58507d834c836604ab385fb8d41b6a2b1a7f497b04c0ac905538fa53076a4c9c
Score
1/10
Malware Config
Signatures
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 35 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a0031000000000072546c79102054656d700000360008000400efbe6b54fa5872546c792a00000001020000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000006b545c63100041646d696e00380008000400efbe6b54fa586b545c632a00000033000000000003000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c0031000000000072546d7910204c6f63616c00380008000400efbe6b54fa5872546d792a000000000200000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000006b54fa58122041707044617461003c0008000400efbe6b54fa586b54fa582a000000ed0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000006b54fa581100557365727300600008000400efbeee3a851a6b54fa582a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
SECURE_D.exepid process 972 SECURE_D.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 292 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exepid process 292 explorer.exe 292 explorer.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
cmd.exeexplorer.exedescription pid process target process PID 1496 wrote to memory of 1832 1496 cmd.exe explorer.exe PID 1496 wrote to memory of 1832 1496 cmd.exe explorer.exe PID 1496 wrote to memory of 1832 1496 cmd.exe explorer.exe PID 292 wrote to memory of 1008 292 explorer.exe SECURE_D.exe PID 292 wrote to memory of 1008 292 explorer.exe SECURE_D.exe PID 292 wrote to memory of 1008 292 explorer.exe SECURE_D.exe PID 292 wrote to memory of 1008 292 explorer.exe SECURE_D.exe PID 1496 wrote to memory of 972 1496 cmd.exe SECURE_D.exe PID 1496 wrote to memory of 972 1496 cmd.exe SECURE_D.exe PID 1496 wrote to memory of 972 1496 cmd.exe SECURE_D.exe PID 1496 wrote to memory of 972 1496 cmd.exe SECURE_D.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SECURE_D.exe"C:\Users\Admin\AppData\Local\Temp\SECURE_D.exe"1⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exeexplorer .2⤵
-
C:\Users\Admin\AppData\Local\Temp\SECURE_D.exesecure_d2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SECURE_D.exe"C:\Users\Admin\AppData\Local\Temp\SECURE_D.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/292-61-0x0000000003730000-0x0000000003731000-memory.dmpFilesize
4KB
-
memory/972-70-0x0000000004E86000-0x0000000004E87000-memory.dmpFilesize
4KB
-
memory/972-69-0x0000000004E75000-0x0000000004E86000-memory.dmpFilesize
68KB
-
memory/972-67-0x0000000073DD0000-0x00000000744BE000-memory.dmpFilesize
6.9MB
-
memory/972-68-0x0000000004E70000-0x0000000004E71000-memory.dmpFilesize
4KB
-
memory/972-66-0x0000000000040000-0x000000000015C000-memory.dmpFilesize
1.1MB
-
memory/1008-64-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1008-62-0x0000000000FC0000-0x00000000010DC000-memory.dmpFilesize
1.1MB
-
memory/1008-65-0x0000000000305000-0x0000000000316000-memory.dmpFilesize
68KB
-
memory/1008-63-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/1832-59-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmpFilesize
8KB
-
memory/1840-54-0x0000000000F30000-0x000000000104C000-memory.dmpFilesize
1.1MB
-
memory/1840-58-0x0000000004565000-0x0000000004576000-memory.dmpFilesize
68KB
-
memory/1840-57-0x0000000004E60000-0x0000000004F10000-memory.dmpFilesize
704KB
-
memory/1840-56-0x0000000004560000-0x0000000004561000-memory.dmpFilesize
4KB
-
memory/1840-55-0x00000000740C0000-0x00000000747AE000-memory.dmpFilesize
6.9MB