Analysis
-
max time kernel
109s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe
Resource
win10v2004-20220812-en
General
-
Target
abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe
-
Size
128KB
-
MD5
4ec125b41e54d3c7ccc4fd27505c1b81
-
SHA1
699744dc12164fbe81c0787b9c51772e3877d854
-
SHA256
abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203
-
SHA512
c3d0be2dc2b1403e5ce0674186aa91fa23ea97c3e031d6daddc8c60321fd9081c03373755ecb6620a1d34b853543d97c8d074b941dc55a2afdf284f429f4f2f8
-
SSDEEP
1536:zFldNN/8+LC7GemzxeZTYgxg5BjJ8vB7j+2nl4NGCzFbwJ4Xj6aZapk:J1N/RoGemleJGBjJ8lTl4NGCGiGk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1052 Madtdf.exe 1324 Madtdf.exe -
Loads dropped DLL 2 IoCs
pid Process 1028 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 1028 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Madtdf = "C:\\Users\\Admin\\AppData\\Roaming\\Madtdf.exe" abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 836 set thread context of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 1052 set thread context of 1324 1052 Madtdf.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B8A7741-441D-11ED-B25A-FE72C9E2D9C9} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371677771" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1028 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1324 Madtdf.exe Token: SeDebugPrivilege 1020 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 288 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 288 IEXPLORE.EXE 288 IEXPLORE.EXE 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 836 wrote to memory of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 836 wrote to memory of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 836 wrote to memory of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 836 wrote to memory of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 836 wrote to memory of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 836 wrote to memory of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 836 wrote to memory of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 836 wrote to memory of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 836 wrote to memory of 1028 836 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 27 PID 1028 wrote to memory of 1052 1028 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 28 PID 1028 wrote to memory of 1052 1028 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 28 PID 1028 wrote to memory of 1052 1028 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 28 PID 1028 wrote to memory of 1052 1028 abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe 28 PID 1052 wrote to memory of 1324 1052 Madtdf.exe 29 PID 1052 wrote to memory of 1324 1052 Madtdf.exe 29 PID 1052 wrote to memory of 1324 1052 Madtdf.exe 29 PID 1052 wrote to memory of 1324 1052 Madtdf.exe 29 PID 1052 wrote to memory of 1324 1052 Madtdf.exe 29 PID 1052 wrote to memory of 1324 1052 Madtdf.exe 29 PID 1052 wrote to memory of 1324 1052 Madtdf.exe 29 PID 1052 wrote to memory of 1324 1052 Madtdf.exe 29 PID 1052 wrote to memory of 1324 1052 Madtdf.exe 29 PID 1324 wrote to memory of 948 1324 Madtdf.exe 30 PID 1324 wrote to memory of 948 1324 Madtdf.exe 30 PID 1324 wrote to memory of 948 1324 Madtdf.exe 30 PID 1324 wrote to memory of 948 1324 Madtdf.exe 30 PID 948 wrote to memory of 288 948 iexplore.exe 31 PID 948 wrote to memory of 288 948 iexplore.exe 31 PID 948 wrote to memory of 288 948 iexplore.exe 31 PID 948 wrote to memory of 288 948 iexplore.exe 31 PID 288 wrote to memory of 1020 288 IEXPLORE.EXE 33 PID 288 wrote to memory of 1020 288 IEXPLORE.EXE 33 PID 288 wrote to memory of 1020 288 IEXPLORE.EXE 33 PID 288 wrote to memory of 1020 288 IEXPLORE.EXE 33 PID 1324 wrote to memory of 1020 1324 Madtdf.exe 33 PID 1324 wrote to memory of 1020 1324 Madtdf.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe"C:\Users\Admin\AppData\Local\Temp\abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exeC:\Users\Admin\AppData\Local\Temp\abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Roaming\Madtdf.exe"C:\Users\Admin\AppData\Roaming\Madtdf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Roaming\Madtdf.exeC:\Users\Admin\AppData\Roaming\Madtdf.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:288 CREDAT:275457 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD54ec125b41e54d3c7ccc4fd27505c1b81
SHA1699744dc12164fbe81c0787b9c51772e3877d854
SHA256abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203
SHA512c3d0be2dc2b1403e5ce0674186aa91fa23ea97c3e031d6daddc8c60321fd9081c03373755ecb6620a1d34b853543d97c8d074b941dc55a2afdf284f429f4f2f8
-
Filesize
128KB
MD54ec125b41e54d3c7ccc4fd27505c1b81
SHA1699744dc12164fbe81c0787b9c51772e3877d854
SHA256abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203
SHA512c3d0be2dc2b1403e5ce0674186aa91fa23ea97c3e031d6daddc8c60321fd9081c03373755ecb6620a1d34b853543d97c8d074b941dc55a2afdf284f429f4f2f8
-
Filesize
128KB
MD54ec125b41e54d3c7ccc4fd27505c1b81
SHA1699744dc12164fbe81c0787b9c51772e3877d854
SHA256abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203
SHA512c3d0be2dc2b1403e5ce0674186aa91fa23ea97c3e031d6daddc8c60321fd9081c03373755ecb6620a1d34b853543d97c8d074b941dc55a2afdf284f429f4f2f8
-
Filesize
599B
MD50c0ac4a3409465fd8175b0236db13374
SHA17fab3ac87df874edf6b0e8824d475ed64954cf0e
SHA2560485488ee973e88e5a55b050ec008f4632ae31c1c5a619878490d1f2e212ff90
SHA51233075425fb5a8c1865673ad2cd986cef2431973c6398b8b8ccc919d74b660c74acfc41412c52f9d05e2650e7e75b38effa5f30e130967c9828fa38598cc1d972
-
Filesize
128KB
MD54ec125b41e54d3c7ccc4fd27505c1b81
SHA1699744dc12164fbe81c0787b9c51772e3877d854
SHA256abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203
SHA512c3d0be2dc2b1403e5ce0674186aa91fa23ea97c3e031d6daddc8c60321fd9081c03373755ecb6620a1d34b853543d97c8d074b941dc55a2afdf284f429f4f2f8
-
Filesize
128KB
MD54ec125b41e54d3c7ccc4fd27505c1b81
SHA1699744dc12164fbe81c0787b9c51772e3877d854
SHA256abe331ea92d1364501e5aa4f76bf20379c6eb3325e167e52b86194d2d71f2203
SHA512c3d0be2dc2b1403e5ce0674186aa91fa23ea97c3e031d6daddc8c60321fd9081c03373755ecb6620a1d34b853543d97c8d074b941dc55a2afdf284f429f4f2f8