Analysis
-
max time kernel
55s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 07:04
Static task
static1
Behavioral task
behavioral1
Sample
a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe
Resource
win10v2004-20220901-en
General
-
Target
a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe
-
Size
45KB
-
MD5
6dd401cafb34280d52a7e41ded794c41
-
SHA1
f67fe72afc5066d1089c02594e5df0d6a02ab4b9
-
SHA256
a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb
-
SHA512
418f086a9a80bc3cca589e8991e94be4f2f1ad7240b2307aa2678433205a660f2618eebc17223f9d36e5e4b2cd2cdc07af9c92add98c36f54551040a1bc950e0
-
SSDEEP
768:ywTukTPTBKhmGjam9HczJqoBRV+CsGlsdnBqhmef1hXLssk4fBf0YU7sw8XK:yKNTPmTczJZbXPsdVI1lLh1Ysw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "1" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\dao.ico a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TYPEDURLS a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "Microsoft Internet Explorer" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Window Title = "Microsoft Internet Explorer" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.ccc7.com" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.ccc7.com" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M)\Command\ = "Rundll32.exe" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\WantsParseDisplayName a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\Command a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Pz a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R) a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M) a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\5 = "51" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8} a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\DefaultIcon a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D)\Command\ = "Rundll32.exe" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D) a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\Command\ = "iexplore.exe http://www.ccc7.com" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\HideFolderVerbs a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\1 = "20221002" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\9 = "1" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\ = "´ò¿ªÖ÷Ò³(&H)" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D)\Command a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M)\Command a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O) a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\Attributes = "0" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ = "Internet Explorer" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R)\Command a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Pz\9 = "0" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\HideOnDesktopPerUser a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1448 1888 a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe 28 PID 1888 wrote to memory of 1448 1888 a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe 28 PID 1888 wrote to memory of 1448 1888 a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe 28 PID 1888 wrote to memory of 1448 1888 a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe"C:\Users\Admin\AppData\Local\Temp\a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exeC:\Users\Admin\AppData\Local\Temp\a1f798cb0672be8f80960f435762858e471e9b48abe789fb965e6265ee5cc5cb.exe2⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:1448
-