Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe
Resource
win10v2004-20220901-en
General
-
Target
38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe
-
Size
361KB
-
MD5
44e2af2c20f2f816c2c099836589ec4d
-
SHA1
fde3d551110c3a791baf47c72fccafea7b92b712
-
SHA256
38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef
-
SHA512
e294c6f6c3a73eebf5783cc8668c55d34677df1e02d9073b3cf1ec666c5406ee2a618ac44bf93253ac0a6f56568569dfe2de28cf00309cea938325d6a06b8f46
-
SSDEEP
6144:XflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:XflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1624 sqlkxwuqojazusrm.exe 1260 CreateProcess.exe 1504 rnnjgcyyur.exe 1332 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1624 sqlkxwuqojazusrm.exe 1624 sqlkxwuqojazusrm.exe 1504 rnnjgcyyur.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 572 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a3000000000200000000001066000000010000200000005f0a13abfc29083cb97ff6a21d0d323c5a7b8f5fa5865972f41322b01b14b880000000000e800000000200002000000006daf20340d3ac6cdc49a75ec746f526e351217d5c4ea6fcd12ae89b1edfc95420000000caba126f5ed6995ad46a3abd6f7ee3bf57bb04ebbf77af592a75164c89254842400000002b1bc6a9e0880d646369522a18ecbafecbc7f529cbc747552b80ea8ba392d383e70232d84ce39eab0e76cec465c722dd91b21d0624a4942f37644b978ed32241 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370335241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09bfe4df4cbd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DDE2711-37E7-11ED-A064-6A6CB2F85B9F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1624 sqlkxwuqojazusrm.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1624 sqlkxwuqojazusrm.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1624 sqlkxwuqojazusrm.exe 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 1624 sqlkxwuqojazusrm.exe 1624 sqlkxwuqojazusrm.exe 1624 sqlkxwuqojazusrm.exe 1624 sqlkxwuqojazusrm.exe 1504 rnnjgcyyur.exe 1504 rnnjgcyyur.exe 1504 rnnjgcyyur.exe 1504 rnnjgcyyur.exe 1504 rnnjgcyyur.exe 1504 rnnjgcyyur.exe 1504 rnnjgcyyur.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1624 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 28 PID 1972 wrote to memory of 1624 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 28 PID 1972 wrote to memory of 1624 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 28 PID 1972 wrote to memory of 1624 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 28 PID 1972 wrote to memory of 1696 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 29 PID 1972 wrote to memory of 1696 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 29 PID 1972 wrote to memory of 1696 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 29 PID 1972 wrote to memory of 1696 1972 38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe 29 PID 1696 wrote to memory of 1272 1696 iexplore.exe 31 PID 1696 wrote to memory of 1272 1696 iexplore.exe 31 PID 1696 wrote to memory of 1272 1696 iexplore.exe 31 PID 1696 wrote to memory of 1272 1696 iexplore.exe 31 PID 1624 wrote to memory of 1260 1624 sqlkxwuqojazusrm.exe 33 PID 1624 wrote to memory of 1260 1624 sqlkxwuqojazusrm.exe 33 PID 1624 wrote to memory of 1260 1624 sqlkxwuqojazusrm.exe 33 PID 1624 wrote to memory of 1260 1624 sqlkxwuqojazusrm.exe 33 PID 1504 wrote to memory of 1332 1504 rnnjgcyyur.exe 35 PID 1504 wrote to memory of 1332 1504 rnnjgcyyur.exe 35 PID 1504 wrote to memory of 1332 1504 rnnjgcyyur.exe 35 PID 1504 wrote to memory of 1332 1504 rnnjgcyyur.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe"C:\Users\Admin\AppData\Local\Temp\38f26c54093bd19a87cd42062437d2a19511c3dd3447710795c7800c07fa43ef.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Temp\sqlkxwuqojazusrm.exeC:\Temp\sqlkxwuqojazusrm.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\rnnjgcyyur.exe ups_run3⤵
- Executes dropped EXE
PID:1260 -
C:\Temp\rnnjgcyyur.exeC:\Temp\rnnjgcyyur.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1332 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:572
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD534b91a35ce7f29da1a58cbe6e43c5fd3
SHA11bf44f85245dfb15a18fd7105b96a01bd650cd29
SHA2564ccf12a166aacea3a0dc5aec4d3aac816fd2c2b38bdd8c7ca91b89bfdf235db2
SHA512955a15909a58b37f187e0c9fdcce1ce91e5a4b32e588bbc34e55ecd5e5f90c68e4ac42c5796e80db58a8cce7cc186eda16acf9f67c19771e61f6421d5cc7b8bd
-
Filesize
3KB
MD534b91a35ce7f29da1a58cbe6e43c5fd3
SHA11bf44f85245dfb15a18fd7105b96a01bd650cd29
SHA2564ccf12a166aacea3a0dc5aec4d3aac816fd2c2b38bdd8c7ca91b89bfdf235db2
SHA512955a15909a58b37f187e0c9fdcce1ce91e5a4b32e588bbc34e55ecd5e5f90c68e4ac42c5796e80db58a8cce7cc186eda16acf9f67c19771e61f6421d5cc7b8bd
-
Filesize
361KB
MD54643fa70f91a7a7d6b67f29dce6f7dae
SHA168ec219791199b0fafdbd29242d572d6a6574fce
SHA25674de3cd93dfaee2ce7e4b115a7f17179aff0737bb68ffb99e76c9e315bd67656
SHA5124d9cf89faf2b47cee76b79436001166d34cb7ece4e6f221f27e4b7db5bb0d14ae7fc754b6f7f5635c13a4fd99dd00692f33b320d63f9c9eeadb7322198f66b7a
-
Filesize
361KB
MD5e0c40a39d1755c55eff460847d78a72e
SHA1a9d75f315089391c8a08962ef0c5d65bb9dae3c3
SHA25647f43478033898c562a6802c14287349d3b3e631245e3a8d803915ce2313bbb3
SHA51200d4ae5177b8b80f0fc3d7946e23c13c962b54ed78daca8a70a49880aa9c0149d9f4b18592d37f453125fd6db73ca0e741377e7218b927d83c94fa3f3bee39cb
-
Filesize
361KB
MD5e0c40a39d1755c55eff460847d78a72e
SHA1a9d75f315089391c8a08962ef0c5d65bb9dae3c3
SHA25647f43478033898c562a6802c14287349d3b3e631245e3a8d803915ce2313bbb3
SHA51200d4ae5177b8b80f0fc3d7946e23c13c962b54ed78daca8a70a49880aa9c0149d9f4b18592d37f453125fd6db73ca0e741377e7218b927d83c94fa3f3bee39cb
-
Filesize
603B
MD5185e8eece473414d9677ad3371eeb633
SHA1643485752af523891dfc76f426ad92a348b019d2
SHA25658398b94f7d470779d398a4c5e62d4e2e48cfe1b8e212d1493976e4930ca74ee
SHA51281c854daf73031c2e5a33c8a1f0c3111965ffd9ed7414e92b0acf1fdb8fc7e3234bfbbe2cd2073e719eee73241bd6f1442d93e334571fb9e9b3422ce287deec5
-
Filesize
3KB
MD534b91a35ce7f29da1a58cbe6e43c5fd3
SHA11bf44f85245dfb15a18fd7105b96a01bd650cd29
SHA2564ccf12a166aacea3a0dc5aec4d3aac816fd2c2b38bdd8c7ca91b89bfdf235db2
SHA512955a15909a58b37f187e0c9fdcce1ce91e5a4b32e588bbc34e55ecd5e5f90c68e4ac42c5796e80db58a8cce7cc186eda16acf9f67c19771e61f6421d5cc7b8bd
-
Filesize
3KB
MD534b91a35ce7f29da1a58cbe6e43c5fd3
SHA11bf44f85245dfb15a18fd7105b96a01bd650cd29
SHA2564ccf12a166aacea3a0dc5aec4d3aac816fd2c2b38bdd8c7ca91b89bfdf235db2
SHA512955a15909a58b37f187e0c9fdcce1ce91e5a4b32e588bbc34e55ecd5e5f90c68e4ac42c5796e80db58a8cce7cc186eda16acf9f67c19771e61f6421d5cc7b8bd
-
Filesize
3KB
MD534b91a35ce7f29da1a58cbe6e43c5fd3
SHA11bf44f85245dfb15a18fd7105b96a01bd650cd29
SHA2564ccf12a166aacea3a0dc5aec4d3aac816fd2c2b38bdd8c7ca91b89bfdf235db2
SHA512955a15909a58b37f187e0c9fdcce1ce91e5a4b32e588bbc34e55ecd5e5f90c68e4ac42c5796e80db58a8cce7cc186eda16acf9f67c19771e61f6421d5cc7b8bd
-
Filesize
3KB
MD534b91a35ce7f29da1a58cbe6e43c5fd3
SHA11bf44f85245dfb15a18fd7105b96a01bd650cd29
SHA2564ccf12a166aacea3a0dc5aec4d3aac816fd2c2b38bdd8c7ca91b89bfdf235db2
SHA512955a15909a58b37f187e0c9fdcce1ce91e5a4b32e588bbc34e55ecd5e5f90c68e4ac42c5796e80db58a8cce7cc186eda16acf9f67c19771e61f6421d5cc7b8bd
-
Filesize
361KB
MD5e0c40a39d1755c55eff460847d78a72e
SHA1a9d75f315089391c8a08962ef0c5d65bb9dae3c3
SHA25647f43478033898c562a6802c14287349d3b3e631245e3a8d803915ce2313bbb3
SHA51200d4ae5177b8b80f0fc3d7946e23c13c962b54ed78daca8a70a49880aa9c0149d9f4b18592d37f453125fd6db73ca0e741377e7218b927d83c94fa3f3bee39cb