Analysis
-
max time kernel
104s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 01:50
Static task
static1
Behavioral task
behavioral1
Sample
38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe
Resource
win10v2004-20220812-en
General
-
Target
38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe
-
Size
524KB
-
MD5
66b954f24fb3c847b7ba75e1dfccd91b
-
SHA1
89ad34c23b0c6c9b8612d8f9a2404fce9bf2e059
-
SHA256
38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129
-
SHA512
0df7ec7897aa3496f013bf53f8bbe01beb33bd0d28ee9a7b5d718b21950b024a63a47012f3bda0b2b7d5ecbc7da8e82b9493f2c848d68ced97d630970f76b71f
-
SSDEEP
12288:hkhIj6W6nGbmuUqvZ0902fEWG3O/Q5lXhyEyFF:hkhjQmuUqve907r+Y5l/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 960 cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08aa7f025ddd801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10DA37A1-4919-11ED-BD9E-FAB5137186BE} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf00000000020000000000106600000001000020000000ffa4c3f0cac9ca8f9211b04af9d5a0fe8037d387dacee5f6f15411ae037e2b0a000000000e8000000002000020000000a67f1c037d0f5846640c2ed782e43d2d398e1f343affced68cc76e0cba84c9472000000084d5a31ae59be43096dcd995cb6e61145c1ea07859d56a35e666f482cc00ab1d40000000c12c3b20555f092f383a320d77c3496100b4d9f4969d3d63ae537f9a91655f1f83441af6374156e4ed617fd0c5338ecd625839b903b1aad2085aa15151599c26 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372225733" IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1136 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1136 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe 27 PID 1660 wrote to memory of 1136 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe 27 PID 1660 wrote to memory of 1136 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe 27 PID 1660 wrote to memory of 1136 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe 27 PID 1136 wrote to memory of 2004 1136 IEXPLORE.EXE 29 PID 1136 wrote to memory of 2004 1136 IEXPLORE.EXE 29 PID 1136 wrote to memory of 2004 1136 IEXPLORE.EXE 29 PID 1136 wrote to memory of 2004 1136 IEXPLORE.EXE 29 PID 1660 wrote to memory of 960 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe 30 PID 1660 wrote to memory of 960 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe 30 PID 1660 wrote to memory of 960 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe 30 PID 1660 wrote to memory of 960 1660 38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe"C:\Users\Admin\AppData\Local\Temp\38cab2c36aff531287198bbcb44590c352758eaf11d5a56cbd8b728d42909129.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.wa300.com/tj.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1136 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\38CAB2~1.EXE2⤵
- Deletes itself
PID:960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD582aefa3008aea223c233c51db59e2e5f
SHA10093890f8f395c30e6376f51105f7b35321554b1
SHA2564334ed3557df04c54a780eade54f1a9ad6dd695260ec0fb3139b78e15eb7fa13
SHA51210044aa7e7b4451520b3c85114c1ed94b439e7de916ae7935a0839a6bb8f005e84095c9179d755879a8111154455db0eee56ba58410d2349f5e6fff4baf50e1d