Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:26
Static task
static1
Behavioral task
behavioral1
Sample
a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe
Resource
win7-20220414-en
General
-
Target
a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe
-
Size
5.5MB
-
MD5
b3863bbc73d91468ea53c31854185a25
-
SHA1
3e6b51f04220771969c141edc17e07ed88bde7f8
-
SHA256
a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586
-
SHA512
ad7620e18047d1ea029e2a87444bd3918407a1e04b2e5d7e8fc4e9332a6fb8ff5f973b6af1cd8ee377fc3fbff1b14cd7db055c3bd378e39eb0702815d2041837
Malware Config
Signatures
-
Processes:
a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe -
Processes:
iexplore.exeIEXPLORE.EXEa9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB6ECEC1-D894-11EC-917F-6AE7990DC39D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004863fcdc101a3947b120786fa95ba35b0000000002000000000010660000000100002000000013c54545e08439481a82b9688fe4521fb6d5b13022082718968b04e8172a9c8d000000000e80000000020000200000004bbd79b3294e97504ce98bee837db2a0231b74400f8f050f369fd7bb6a414251200000004ba0a40bf56bd29c6fbe9d6eda077373471cc6c243d2e6f12e49c1e6e46584124000000051583b50cc41ba315583fb080ebbc8f7320fd3cec48c5875b11c12daf4908dd77007d67886410ac2e9d5aa8a71270d4ec0181c3c0d785af1d480b132887e8637 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f9a88fa16cd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "359854333" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exeiexplore.exeIEXPLORE.EXEpid process 1668 a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe 1668 a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe 2020 iexplore.exe 2020 iexplore.exe 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
iexplore.exedescription pid process target process PID 2020 wrote to memory of 1692 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 1692 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 1692 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 1692 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 1692 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 1692 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 1692 2020 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe"C:\Users\Admin\AppData\Local\Temp\a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ezmz917\imagestore.datFilesize
5KB
MD52beb86f1803c9a2d6077a5d36a88dc6c
SHA18f0f9c3f8fa4c973f0d937f2d14420bf3ea311a2
SHA256306339be75eb941c4953fae3cc6656090b948ebba2bc10aa09421aee724cac06
SHA512d1ac20e35efd23c2e1b7c95de352d3baf9b3f252b5024842b0677f96627a614490546ca2c41af4c57677c372e3a2f827703ac4fea1c399901d6d78945f5ece2a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\30EWM1QE.txtFilesize
602B
MD5e9da482605a80b6a1c0f1ae902e43de6
SHA15529e7491bcfd3ceb59e7724885ed335cc5e0b09
SHA256e691b9bc48edf20ced3415594f5fcbdf6e32bd187869b44c951ae23455bc7fab
SHA51295520990869b10aa3b2060cddac9cf6418966680860222552384b4844d3bcf8a20d0b45028bd0b88aaee9c64575899d0e681d1857ac8254969c1001c7133df33
-
memory/1668-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmpFilesize
8KB