Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 03:34
Static task
static1
Behavioral task
behavioral1
Sample
6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe
Resource
win10v2004-20220812-en
General
-
Target
6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe
-
Size
361KB
-
MD5
437309d104ca341348f98d56425358fc
-
SHA1
41494a4c7d122570ea1d14f1ba9605b0242134f5
-
SHA256
6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c
-
SHA512
8e140990002713aacdb5a5c42e2cf39c911f0660b75ec9a7da6ebc3e29a1dd56018d3dc3c2150e4e8ecf176a33caafb603b830cad57a7da7b482d405f5416973
-
SSDEEP
6144:WflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:WflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 544 bwnlhfbzqlkidcxo.exe 1848 CreateProcess.exe 1888 yvrnnjgcqq.exe 840 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 544 bwnlhfbzqlkidcxo.exe 544 bwnlhfbzqlkidcxo.exe 1888 yvrnnjgcqq.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1036 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508bcd07e5cbd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{276CC9D1-37D8-11ED-A584-DA3F1CB7DA19} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a000000000200000000001066000000010000200000006c9696a342c4462e8cbc7e4b0da9d2dc9041c146c81cbf5fdd329831d6d6a825000000000e8000000002000020000000dc35a1663b28e5038907301a3ebb4addde27910a9a6b1d7f8d1dbe8ead45d25120000000c703b90aa7916b44f1a73ae8d46efef93f53917a94191ec5bbf186b73c674ad7400000004d42c58c11f2e6ff501a64670e99c048d0027878d91385bae41997c17e48a6c51fdfb9ac5e3a7f6d8a73a9ad4328af0cdaf08150491538b4005a988bf6f25a9e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370328679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 544 bwnlhfbzqlkidcxo.exe 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 544 bwnlhfbzqlkidcxo.exe 544 bwnlhfbzqlkidcxo.exe 544 bwnlhfbzqlkidcxo.exe 544 bwnlhfbzqlkidcxo.exe 544 bwnlhfbzqlkidcxo.exe 544 bwnlhfbzqlkidcxo.exe 1888 yvrnnjgcqq.exe 1888 yvrnnjgcqq.exe 1888 yvrnnjgcqq.exe 1888 yvrnnjgcqq.exe 1888 yvrnnjgcqq.exe 1888 yvrnnjgcqq.exe 1888 yvrnnjgcqq.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 584 iexplore.exe 584 iexplore.exe 876 IEXPLORE.EXE 876 IEXPLORE.EXE 876 IEXPLORE.EXE 876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 960 wrote to memory of 544 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 27 PID 960 wrote to memory of 544 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 27 PID 960 wrote to memory of 544 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 27 PID 960 wrote to memory of 544 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 27 PID 960 wrote to memory of 584 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 28 PID 960 wrote to memory of 584 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 28 PID 960 wrote to memory of 584 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 28 PID 960 wrote to memory of 584 960 6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe 28 PID 584 wrote to memory of 876 584 iexplore.exe 30 PID 584 wrote to memory of 876 584 iexplore.exe 30 PID 584 wrote to memory of 876 584 iexplore.exe 30 PID 584 wrote to memory of 876 584 iexplore.exe 30 PID 544 wrote to memory of 1848 544 bwnlhfbzqlkidcxo.exe 32 PID 544 wrote to memory of 1848 544 bwnlhfbzqlkidcxo.exe 32 PID 544 wrote to memory of 1848 544 bwnlhfbzqlkidcxo.exe 32 PID 544 wrote to memory of 1848 544 bwnlhfbzqlkidcxo.exe 32 PID 1888 wrote to memory of 840 1888 yvrnnjgcqq.exe 34 PID 1888 wrote to memory of 840 1888 yvrnnjgcqq.exe 34 PID 1888 wrote to memory of 840 1888 yvrnnjgcqq.exe 34 PID 1888 wrote to memory of 840 1888 yvrnnjgcqq.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe"C:\Users\Admin\AppData\Local\Temp\6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Temp\bwnlhfbzqlkidcxo.exeC:\Temp\bwnlhfbzqlkidcxo.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:544 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\yvrnnjgcqq.exe ups_run3⤵
- Executes dropped EXE
PID:1848 -
C:\Temp\yvrnnjgcqq.exeC:\Temp\yvrnnjgcqq.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:840 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1036
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:876
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ed1876d3b75dd447cc73b64cda6f6894
SHA13164f471810f92b365c5ef21b958b8b5daeac990
SHA25622f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253
SHA512de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b
-
Filesize
3KB
MD5ed1876d3b75dd447cc73b64cda6f6894
SHA13164f471810f92b365c5ef21b958b8b5daeac990
SHA25622f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253
SHA512de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b
-
Filesize
361KB
MD57f2ce49fe520aedfafc7334c69f20802
SHA16ebdee2cf71095d9e126d4b7a3935c7fb446df3c
SHA256f31bb19fde66cd187d4a288336c0ff5e7002cc76ee89da23408e54a17a738b23
SHA512bbec5ecc31044d7b41d2ed4c9fb00cdc4ebc59c14276cffb7f7b646828bc5b521a2420ed3f4ec519a61988dd84f90d8f3ce0f232c562696b61c0532b80df23f4
-
Filesize
361KB
MD57f2ce49fe520aedfafc7334c69f20802
SHA16ebdee2cf71095d9e126d4b7a3935c7fb446df3c
SHA256f31bb19fde66cd187d4a288336c0ff5e7002cc76ee89da23408e54a17a738b23
SHA512bbec5ecc31044d7b41d2ed4c9fb00cdc4ebc59c14276cffb7f7b646828bc5b521a2420ed3f4ec519a61988dd84f90d8f3ce0f232c562696b61c0532b80df23f4
-
Filesize
361KB
MD5dc11cbcf1949d1c3b0e4dc6318903c38
SHA12a60fb8845dbac3f2f9990067d9a8c4badd7fecf
SHA256d9e720ca484d6b3a34223d78a3bd10972302f949d46af687771785ffe93aea00
SHA5121818bc47a7e0f29f81e55d12a5e74e3eedd6badd49640dcf8348b75f8582d9df4d61302fa58cc5257781da1f2dcc924af5d222fc16f771c710e1b6acfab08377
-
Filesize
603B
MD5a53c5a1867dab74e41e03ed5fb7f7bb1
SHA1d23aa5a1f8dc0f6af0657d54e3b1765395a61a4e
SHA256e4e1eadcb466a9e41464c3bb417c1911431f698973385e3bed406750eab88d0f
SHA512f8c288d6e702105fab4da054941a88a0ff1f4fddab8a744eef6730c9432e8ec8634f05f62b7a555417e53797e088fbbc942bd78dd84538cb2b768a7ced7fb11b
-
Filesize
3KB
MD5ed1876d3b75dd447cc73b64cda6f6894
SHA13164f471810f92b365c5ef21b958b8b5daeac990
SHA25622f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253
SHA512de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b
-
Filesize
3KB
MD5ed1876d3b75dd447cc73b64cda6f6894
SHA13164f471810f92b365c5ef21b958b8b5daeac990
SHA25622f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253
SHA512de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b
-
Filesize
3KB
MD5ed1876d3b75dd447cc73b64cda6f6894
SHA13164f471810f92b365c5ef21b958b8b5daeac990
SHA25622f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253
SHA512de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b
-
Filesize
3KB
MD5ed1876d3b75dd447cc73b64cda6f6894
SHA13164f471810f92b365c5ef21b958b8b5daeac990
SHA25622f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253
SHA512de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b
-
Filesize
361KB
MD57f2ce49fe520aedfafc7334c69f20802
SHA16ebdee2cf71095d9e126d4b7a3935c7fb446df3c
SHA256f31bb19fde66cd187d4a288336c0ff5e7002cc76ee89da23408e54a17a738b23
SHA512bbec5ecc31044d7b41d2ed4c9fb00cdc4ebc59c14276cffb7f7b646828bc5b521a2420ed3f4ec519a61988dd84f90d8f3ce0f232c562696b61c0532b80df23f4