Analysis

  • max time kernel
    137s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-05-2022 02:02

General

  • Target

    0d8e2d766b0a4f54f6a2cfaad08ce86d87eec1bc28c0ea7d86147b969231e693.exe

  • Size

    2.8MB

  • MD5

    13dd1d94cf3cd70c0310944307efc4d1

  • SHA1

    056314c899f707fdb97bc3bbea753ba9ee540397

  • SHA256

    0d8e2d766b0a4f54f6a2cfaad08ce86d87eec1bc28c0ea7d86147b969231e693

  • SHA512

    0554fd382f48924951b07b4ac1934c90f47db21060f9c03953a79aa0db23752baf1f25871aca451af9d8c9d489b49105fd288981b8fcc8ddf6936bd519182438

Malware Config

Signatures

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d8e2d766b0a4f54f6a2cfaad08ce86d87eec1bc28c0ea7d86147b969231e693.exe
    "C:\Users\Admin\AppData\Local\Temp\0d8e2d766b0a4f54f6a2cfaad08ce86d87eec1bc28c0ea7d86147b969231e693.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.d1kf.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    3c94b790a4d3d3813b9804b360811c02

    SHA1

    9b42bca99be723330c45b22abb0698f77ef8077a

    SHA256

    7bc88a561babff736195edc916e12556d4a870e9dc94e649adff7d6859468d93

    SHA512

    594410b019fde2552e456bf87934eab332c73d5a1c73c3fac27886bb2c8f2b2c174acb0fa5f67b40a4b41339cff713b239eab680c6dd7aab00aacaf8e38538b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    edef41d349abad12194c2d85f7a7a54b

    SHA1

    27258fa2766dda7cc4f9f4db37d403d63f6acbbf

    SHA256

    56a95ba20171f8bd47d66355d91200de8ee3e5df677b12d786aec1a3643528e9

    SHA512

    60a24eb4271022dde6207459f12276e92e3727604e45c44022e7ea429c639120178c329a9b55a221811cf329956115562348aa6b045f785ba9fea46a96ab3aa1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnqp20o\imagestore.dat

    Filesize

    1KB

    MD5

    10e6659a4669d1c34607a91cd2661624

    SHA1

    700d21f99e9d26f97e81cbafc02c2590c3ea9d99

    SHA256

    a7dcb05ebab5b10cc9a57e9de572f54b100159f87890cd6480b121428c9cbaf3

    SHA512

    64ebfe559d4a781f93e16a8d51e470b6a76c1c8bf9d53209dd5393be59aa879130d399c16c71a2472b162f4b3d5150900ef01dd1bca79126aa5e8b53560852e8

  • memory/2184-156-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-160-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-138-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-140-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-142-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-144-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-146-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-148-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-150-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-152-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-154-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-131-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-158-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-136-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-162-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-164-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-166-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-168-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-170-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-172-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-174-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-176-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-135-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-134-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2184-133-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB