Analysis
-
max time kernel
153s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe
Resource
win10v2004-20220812-en
General
-
Target
e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe
-
Size
380KB
-
MD5
18aa0bef445d1f25073ced4b063fd0e0
-
SHA1
73421424218777d3f41089962b66ab3142c6b983
-
SHA256
e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995
-
SHA512
e120e45b2a3149f3359828ba9907d91936f8f7c99d5ece7966c1cdbd31a16bdadd57461226e77cef5474a5f4050ad15f9b425992411ffaeabddb79b7b40ea8f8
-
SSDEEP
6144:mK5THZhSpD/gc/ZZCtNi4e0WrhMNb1uicaKdIxrtp/USuOIJ0:mK5LyjV/ZZCtk4eVsJ0eT/1R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1864 winchk.exe -
Loads dropped DLL 5 IoCs
pid Process 1668 e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe 1668 e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe 1864 winchk.exe 1864 winchk.exe 1992 IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winchk = "C:\\ProgramData\\WebExt\\winchk.exe" winchk.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372316454" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49C1D271-49EC-11ED-BB94-5A21EB137514} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1864 winchk.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1864 winchk.exe 1864 winchk.exe 1864 winchk.exe 2024 iexplore.exe 2024 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1864 1668 e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe 28 PID 1668 wrote to memory of 1864 1668 e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe 28 PID 1668 wrote to memory of 1864 1668 e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe 28 PID 1668 wrote to memory of 1864 1668 e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe 28 PID 1864 wrote to memory of 2024 1864 winchk.exe 29 PID 1864 wrote to memory of 2024 1864 winchk.exe 29 PID 1864 wrote to memory of 2024 1864 winchk.exe 29 PID 1864 wrote to memory of 2024 1864 winchk.exe 29 PID 2024 wrote to memory of 1992 2024 iexplore.exe 31 PID 2024 wrote to memory of 1992 2024 iexplore.exe 31 PID 2024 wrote to memory of 1992 2024 iexplore.exe 31 PID 2024 wrote to memory of 1992 2024 iexplore.exe 31 PID 1864 wrote to memory of 2024 1864 winchk.exe 29 PID 1864 wrote to memory of 2024 1864 winchk.exe 29 PID 1864 wrote to memory of 2024 1864 winchk.exe 29 PID 1864 wrote to memory of 2024 1864 winchk.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe"C:\Users\Admin\AppData\Local\Temp\e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\ProgramData\WebExt\winchk.exeC:\ProgramData\WebExt\winchk.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:24⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD5c5704613c7e79e1f947552a2fbcde09b
SHA1efda1a6acb3c0a8c0a3f8737d061f495bd4483b3
SHA256d13d20e5db6ae7d46d801b707f9faa1a55868dc2aa054a661063763c8ddd4c85
SHA512087b04c2c96167efbac02ebf2d7a6df03afda30618aa3170c39d80a9abc126d223a24f4acffe01b2e21c0e9289abe0251c840f9ef49afd6c7b5d75f142dfd886
-
Filesize
48KB
MD5ade69012c36f4d272716464bc105207c
SHA15d8ce65145f0bde31fbc82f4ae2430845396a05c
SHA256d7224777b5ac61844585f254624476da7c48b9ee157cc694b6d00f60e2531df5
SHA512a241ad16a5506a7f8929c18fa90b2dcd7494977c722198a57f3ead9859f29cc9aa2ae110278b48dbd1b1d12c7fe259e79bfa22b9cb9f1ff52d90a66bae17e344
-
Filesize
380KB
MD518aa0bef445d1f25073ced4b063fd0e0
SHA173421424218777d3f41089962b66ab3142c6b983
SHA256e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995
SHA512e120e45b2a3149f3359828ba9907d91936f8f7c99d5ece7966c1cdbd31a16bdadd57461226e77cef5474a5f4050ad15f9b425992411ffaeabddb79b7b40ea8f8
-
Filesize
380KB
MD518aa0bef445d1f25073ced4b063fd0e0
SHA173421424218777d3f41089962b66ab3142c6b983
SHA256e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995
SHA512e120e45b2a3149f3359828ba9907d91936f8f7c99d5ece7966c1cdbd31a16bdadd57461226e77cef5474a5f4050ad15f9b425992411ffaeabddb79b7b40ea8f8
-
Filesize
598B
MD5a7916b73d77b1bf857426cf7e475842b
SHA132271d85f38e0bb3d4c38eae3745a1c3ecd1c9f0
SHA2567e364488217f7e66f6222f9a167012c5dc9d76b399a7dbf6823c8e9137ec44db
SHA51232046a535c1a7c35c8e24f32a2b71d3a2e6d2d54af211dcff46c900687ea04caac34159f0ab45fdd1553b2d37e88c24812658d75554759232847e22e041b54d7
-
Filesize
48KB
MD5ade69012c36f4d272716464bc105207c
SHA15d8ce65145f0bde31fbc82f4ae2430845396a05c
SHA256d7224777b5ac61844585f254624476da7c48b9ee157cc694b6d00f60e2531df5
SHA512a241ad16a5506a7f8929c18fa90b2dcd7494977c722198a57f3ead9859f29cc9aa2ae110278b48dbd1b1d12c7fe259e79bfa22b9cb9f1ff52d90a66bae17e344
-
Filesize
48KB
MD5ade69012c36f4d272716464bc105207c
SHA15d8ce65145f0bde31fbc82f4ae2430845396a05c
SHA256d7224777b5ac61844585f254624476da7c48b9ee157cc694b6d00f60e2531df5
SHA512a241ad16a5506a7f8929c18fa90b2dcd7494977c722198a57f3ead9859f29cc9aa2ae110278b48dbd1b1d12c7fe259e79bfa22b9cb9f1ff52d90a66bae17e344
-
Filesize
52KB
MD5f57b3722fd8d9df069229d3fcf70d00b
SHA111fa3cecef48dc027d368d8e888bc47554c2d0b5
SHA256fd2faccc01f9b34589236826728810253584bfdf1578fd93c7447df1cbc2f92e
SHA512f15a519cf32623ce663a6603bdfec372d7d20ccae121dce009074627a1acac554a3dae1440a6ba1284b138d6f92f9143f78f83aae6cdbacb301468bef2ed0fb0
-
Filesize
380KB
MD518aa0bef445d1f25073ced4b063fd0e0
SHA173421424218777d3f41089962b66ab3142c6b983
SHA256e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995
SHA512e120e45b2a3149f3359828ba9907d91936f8f7c99d5ece7966c1cdbd31a16bdadd57461226e77cef5474a5f4050ad15f9b425992411ffaeabddb79b7b40ea8f8
-
Filesize
380KB
MD518aa0bef445d1f25073ced4b063fd0e0
SHA173421424218777d3f41089962b66ab3142c6b983
SHA256e6bb450358e56ec1e9dce9bcf916a2928bc33b8647f088ad8cef93f45a9ed995
SHA512e120e45b2a3149f3359828ba9907d91936f8f7c99d5ece7966c1cdbd31a16bdadd57461226e77cef5474a5f4050ad15f9b425992411ffaeabddb79b7b40ea8f8