Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 21:40
Static task
static1
Behavioral task
behavioral1
Sample
1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe
Resource
win10v2004-20220901-en
General
-
Target
1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe
-
Size
361KB
-
MD5
3228ace2a13c6208cfed81472e7cc4e0
-
SHA1
f7648432d266370fe50507f9113790a09b1aa678
-
SHA256
1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a
-
SHA512
326e79856f45652045e5ac85968535d5e2c148cdee43e16127d3a3382b34a67b6e69d44c84bfc4577a80caab92cdaf4b9047a52d5789c1f7bd331be69cb9234f
-
SSDEEP
6144:hflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:hflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1016 qjbpiextmxtlhath.exe 1660 CreateProcess.exe 1816 ebyuokhdal.exe 1916 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1016 qjbpiextmxtlhath.exe 1016 qjbpiextmxtlhath.exe 1816 ebyuokhdal.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1764 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0fcdcb594d7d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000ee96b0429b2aa595489c91a3ebb75c65b61ba4c5d03507c248103fc2c5090e1c000000000e80000000020000200000006515bb83c233289e72453d99cd6b5b64bf2339b3f219876ba3654cdff19b63be20000000110adffa8f04ca6eed23e66d47b85efe692ddb955c8a2e1a30fdbfa671e3dc0c40000000ba02be801b6313da934008fff0d78a7e0ffc19750dfa5fe1668d706d816151138724e63ff4137438209d02551e20613851f5dd1d614d1a5708b4bf67b79463a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0982FD1-4387-11ED-AF38-FE72C9E2D9C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 1016 qjbpiextmxtlhath.exe 1016 qjbpiextmxtlhath.exe 1016 qjbpiextmxtlhath.exe 1016 qjbpiextmxtlhath.exe 1016 qjbpiextmxtlhath.exe 1016 qjbpiextmxtlhath.exe 1016 qjbpiextmxtlhath.exe 1816 ebyuokhdal.exe 1816 ebyuokhdal.exe 1816 ebyuokhdal.exe 1816 ebyuokhdal.exe 1816 ebyuokhdal.exe 1816 ebyuokhdal.exe 1816 ebyuokhdal.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 740 iexplore.exe 740 iexplore.exe 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1016 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 26 PID 1508 wrote to memory of 1016 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 26 PID 1508 wrote to memory of 1016 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 26 PID 1508 wrote to memory of 1016 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 26 PID 1508 wrote to memory of 740 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 27 PID 1508 wrote to memory of 740 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 27 PID 1508 wrote to memory of 740 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 27 PID 1508 wrote to memory of 740 1508 1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe 27 PID 740 wrote to memory of 1136 740 iexplore.exe 29 PID 740 wrote to memory of 1136 740 iexplore.exe 29 PID 740 wrote to memory of 1136 740 iexplore.exe 29 PID 740 wrote to memory of 1136 740 iexplore.exe 29 PID 1016 wrote to memory of 1660 1016 qjbpiextmxtlhath.exe 31 PID 1016 wrote to memory of 1660 1016 qjbpiextmxtlhath.exe 31 PID 1016 wrote to memory of 1660 1016 qjbpiextmxtlhath.exe 31 PID 1016 wrote to memory of 1660 1016 qjbpiextmxtlhath.exe 31 PID 1816 wrote to memory of 1916 1816 ebyuokhdal.exe 33 PID 1816 wrote to memory of 1916 1816 ebyuokhdal.exe 33 PID 1816 wrote to memory of 1916 1816 ebyuokhdal.exe 33 PID 1816 wrote to memory of 1916 1816 ebyuokhdal.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe"C:\Users\Admin\AppData\Local\Temp\1c48f19799fbd1165bee3d6e19332ae4379a771787e997be166359818bbf283a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Temp\qjbpiextmxtlhath.exeC:\Temp\qjbpiextmxtlhath.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\ebyuokhdal.exe ups_run3⤵
- Executes dropped EXE
PID:1660 -
C:\Temp\ebyuokhdal.exeC:\Temp\ebyuokhdal.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1916 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1764
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:740 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1136
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e6fa693d021968f0a6553fd01177aa42
SHA101fd7ad27246379089b69b1104bd014379d0c272
SHA2564d4fba11077fe914636068fb59c24dd8026824659989e0e2ae913127e45c542d
SHA512e1174bb63f551b2bb596957fd1d6551e1900da6a00dd62ab6026420284c57a7f19fd28fb9fa25a4c1062924d8196a2b064ed8fb1ed049d1e84477e33f17bfa4e
-
Filesize
3KB
MD5e6fa693d021968f0a6553fd01177aa42
SHA101fd7ad27246379089b69b1104bd014379d0c272
SHA2564d4fba11077fe914636068fb59c24dd8026824659989e0e2ae913127e45c542d
SHA512e1174bb63f551b2bb596957fd1d6551e1900da6a00dd62ab6026420284c57a7f19fd28fb9fa25a4c1062924d8196a2b064ed8fb1ed049d1e84477e33f17bfa4e
-
Filesize
361KB
MD55cbf286d7550b72ae4b45d0f2af63b5b
SHA142ab448beba11b8bd9e8e55e6ef3f3bba6fd1189
SHA2565ed492f0c740e71a6481828746a8074691e3f382aaf5236f141201b2b660d4e3
SHA512a4a66775a2e258f4ece27839fe39259576e7f91d03c46aa2f5df3355622523629dd39f799696d3b82c91f4ee5f2dde4daba330ccf95dde091892860961b67f21
-
Filesize
361KB
MD50a17e2dca3a0acc41a7f240d7f112e49
SHA14ceccfa7bfa10d14202a4cdb91c4432d47fcd1e5
SHA25691fd08b5effaffd07d5f0fe1fb28265d90acf5a991f7a8270b5e1c055c075f43
SHA512f94790e6094cecaf3cff082b88dee9ad3c8247c74c06bb9e7a067c1cb6fd66d340351c3dfaec498295a60e28dba29a2633db48e4c4b1803d3bff67647418a576
-
Filesize
361KB
MD50a17e2dca3a0acc41a7f240d7f112e49
SHA14ceccfa7bfa10d14202a4cdb91c4432d47fcd1e5
SHA25691fd08b5effaffd07d5f0fe1fb28265d90acf5a991f7a8270b5e1c055c075f43
SHA512f94790e6094cecaf3cff082b88dee9ad3c8247c74c06bb9e7a067c1cb6fd66d340351c3dfaec498295a60e28dba29a2633db48e4c4b1803d3bff67647418a576
-
Filesize
3KB
MD5e6fa693d021968f0a6553fd01177aa42
SHA101fd7ad27246379089b69b1104bd014379d0c272
SHA2564d4fba11077fe914636068fb59c24dd8026824659989e0e2ae913127e45c542d
SHA512e1174bb63f551b2bb596957fd1d6551e1900da6a00dd62ab6026420284c57a7f19fd28fb9fa25a4c1062924d8196a2b064ed8fb1ed049d1e84477e33f17bfa4e
-
Filesize
3KB
MD5e6fa693d021968f0a6553fd01177aa42
SHA101fd7ad27246379089b69b1104bd014379d0c272
SHA2564d4fba11077fe914636068fb59c24dd8026824659989e0e2ae913127e45c542d
SHA512e1174bb63f551b2bb596957fd1d6551e1900da6a00dd62ab6026420284c57a7f19fd28fb9fa25a4c1062924d8196a2b064ed8fb1ed049d1e84477e33f17bfa4e
-
Filesize
3KB
MD5e6fa693d021968f0a6553fd01177aa42
SHA101fd7ad27246379089b69b1104bd014379d0c272
SHA2564d4fba11077fe914636068fb59c24dd8026824659989e0e2ae913127e45c542d
SHA512e1174bb63f551b2bb596957fd1d6551e1900da6a00dd62ab6026420284c57a7f19fd28fb9fa25a4c1062924d8196a2b064ed8fb1ed049d1e84477e33f17bfa4e
-
Filesize
3KB
MD5e6fa693d021968f0a6553fd01177aa42
SHA101fd7ad27246379089b69b1104bd014379d0c272
SHA2564d4fba11077fe914636068fb59c24dd8026824659989e0e2ae913127e45c542d
SHA512e1174bb63f551b2bb596957fd1d6551e1900da6a00dd62ab6026420284c57a7f19fd28fb9fa25a4c1062924d8196a2b064ed8fb1ed049d1e84477e33f17bfa4e
-
Filesize
361KB
MD50a17e2dca3a0acc41a7f240d7f112e49
SHA14ceccfa7bfa10d14202a4cdb91c4432d47fcd1e5
SHA25691fd08b5effaffd07d5f0fe1fb28265d90acf5a991f7a8270b5e1c055c075f43
SHA512f94790e6094cecaf3cff082b88dee9ad3c8247c74c06bb9e7a067c1cb6fd66d340351c3dfaec498295a60e28dba29a2633db48e4c4b1803d3bff67647418a576