Analysis
-
max time kernel
141s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe
Resource
win10v2004-20220812-en
General
-
Target
60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe
-
Size
361KB
-
MD5
4246a8cbe8ae159f7deae34ebea64180
-
SHA1
08353a04ea8141583bcb666e17a1768563a10bbf
-
SHA256
60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5
-
SHA512
ac9833005a28f7743c07e374a796e6f592dd587bb2405336070c429cf58c46b94d0611c27a36e5331a20e6812cd3b1f1b3fdcdb4e5be8b90989809fe1d44b3ac
-
SSDEEP
6144:MflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:MflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2024 gxtokjesnjhdzmig.exe 2008 CreateProcess.exe 1752 nbxuuqmjif.exe 1608 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 2024 gxtokjesnjhdzmig.exe 2024 gxtokjesnjhdzmig.exe 1752 nbxuuqmjif.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1056 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372357794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8900B401-4A4C-11ED-B25A-FE72C9E2D9C9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d001567059ded801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a3000000000200000000001066000000010000200000001daa7d933b107be1f82952eb581643d8075fbcdbfb8494cff872eed96fa01583000000000e8000000002000020000000c0e3effda3c21be5b7654f05e460f32ca493257b2ee90376d4e8d513d91d2b8b20000000bbe5597235a3758761a1095de7d29a37245bc7dbc53ef36348fb92769432c798400000006e022dea419076e3eeba52db5c78b8d30c4e0ac3b5e47c72bcd726b5e31b22e623d5620d74be7710d39620eb25e05fc3b51a347ff4b66b0f03346d8db4c1a92d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 2024 gxtokjesnjhdzmig.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 2024 gxtokjesnjhdzmig.exe 2024 gxtokjesnjhdzmig.exe 2024 gxtokjesnjhdzmig.exe 2024 gxtokjesnjhdzmig.exe 2024 gxtokjesnjhdzmig.exe 2024 gxtokjesnjhdzmig.exe 1752 nbxuuqmjif.exe 1752 nbxuuqmjif.exe 1752 nbxuuqmjif.exe 1752 nbxuuqmjif.exe 1752 nbxuuqmjif.exe 1752 nbxuuqmjif.exe 1752 nbxuuqmjif.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1840 iexplore.exe 1840 iexplore.exe 664 IEXPLORE.EXE 664 IEXPLORE.EXE 664 IEXPLORE.EXE 664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2024 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 27 PID 1640 wrote to memory of 2024 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 27 PID 1640 wrote to memory of 2024 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 27 PID 1640 wrote to memory of 2024 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 27 PID 1640 wrote to memory of 1840 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 28 PID 1640 wrote to memory of 1840 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 28 PID 1640 wrote to memory of 1840 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 28 PID 1640 wrote to memory of 1840 1640 60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe 28 PID 1840 wrote to memory of 664 1840 iexplore.exe 30 PID 1840 wrote to memory of 664 1840 iexplore.exe 30 PID 1840 wrote to memory of 664 1840 iexplore.exe 30 PID 1840 wrote to memory of 664 1840 iexplore.exe 30 PID 2024 wrote to memory of 2008 2024 gxtokjesnjhdzmig.exe 32 PID 2024 wrote to memory of 2008 2024 gxtokjesnjhdzmig.exe 32 PID 2024 wrote to memory of 2008 2024 gxtokjesnjhdzmig.exe 32 PID 2024 wrote to memory of 2008 2024 gxtokjesnjhdzmig.exe 32 PID 1752 wrote to memory of 1608 1752 nbxuuqmjif.exe 34 PID 1752 wrote to memory of 1608 1752 nbxuuqmjif.exe 34 PID 1752 wrote to memory of 1608 1752 nbxuuqmjif.exe 34 PID 1752 wrote to memory of 1608 1752 nbxuuqmjif.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe"C:\Users\Admin\AppData\Local\Temp\60b1acf218476b5cbe56a668428ac558f3c722d8c918111244c6caf71f4210c5.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Temp\gxtokjesnjhdzmig.exeC:\Temp\gxtokjesnjhdzmig.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\nbxuuqmjif.exe ups_run3⤵
- Executes dropped EXE
PID:2008 -
C:\Temp\nbxuuqmjif.exeC:\Temp\nbxuuqmjif.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1608 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1056
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1840 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:664
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ebb530336e0a657bcbcbe1c321d0bd14
SHA11f3dcb5f15c39672e04f440528f63a8da0386227
SHA256d4d71eb26f187b16cab9ba801985804b49bf0862e0d0f3bcd69feddca1e1f882
SHA51294715e3db68ff3699c03871bfa989d40d289d339221b52b3d41fb5efb64bd188a9909b358708b2afed0835ed6a3932db1e99233b80a042f3b1e95ea96839e5dc
-
Filesize
3KB
MD5ebb530336e0a657bcbcbe1c321d0bd14
SHA11f3dcb5f15c39672e04f440528f63a8da0386227
SHA256d4d71eb26f187b16cab9ba801985804b49bf0862e0d0f3bcd69feddca1e1f882
SHA51294715e3db68ff3699c03871bfa989d40d289d339221b52b3d41fb5efb64bd188a9909b358708b2afed0835ed6a3932db1e99233b80a042f3b1e95ea96839e5dc
-
Filesize
361KB
MD5f11afd3fff5bfd6dbaf7c24a11d79c93
SHA17a3e1220b117a470b85a3dae17ff66d57a1d8b7e
SHA256fe2660ec9e52f0cad5b043221cf2858be07cd1dbe605d006af6c27b65dcac8ce
SHA51215bdc5bb2bb9af8eef0fad9db303dcf1382d532d187027225a0294d6f97a309257ec3577b57c16cbf039fcc3508536eb3dd9990754ce4806b62230dcfc6c0d11
-
Filesize
361KB
MD5f11afd3fff5bfd6dbaf7c24a11d79c93
SHA17a3e1220b117a470b85a3dae17ff66d57a1d8b7e
SHA256fe2660ec9e52f0cad5b043221cf2858be07cd1dbe605d006af6c27b65dcac8ce
SHA51215bdc5bb2bb9af8eef0fad9db303dcf1382d532d187027225a0294d6f97a309257ec3577b57c16cbf039fcc3508536eb3dd9990754ce4806b62230dcfc6c0d11
-
Filesize
361KB
MD58297af5db0f9634cb3691ee13580c7cd
SHA197b349c4006fa8efbc4a3681df1028005ac0dda6
SHA25615e5b00d8ede20aa2087dd3fbb49c03c7e8148e72779a792fca027cdb360843b
SHA5126e3f1ab47f9b49c946b2f956986b34839470eb8aa7e737276d73159014538d92c3ef2236a7f65a62977e10680f8b119352820c4d564bd64254f7bd6ff3d51712
-
Filesize
608B
MD514423ab5ea0eb07c0ce0b997f8b6ab88
SHA1ace7310f26b7a4614bfbb1ba0662d58068a86999
SHA256313ef5dc0f37959d6180bae28598461328ca05f882ecadc9ed3e27628d464cbb
SHA5129578b6c9586798418a0426234f4824f22f96145ca65435f4d75527ce89baedd104a3415ebe971b3d7a9ebc6ca1f568a477d631b92e00f651de430a47cdc8d959
-
Filesize
3KB
MD5ebb530336e0a657bcbcbe1c321d0bd14
SHA11f3dcb5f15c39672e04f440528f63a8da0386227
SHA256d4d71eb26f187b16cab9ba801985804b49bf0862e0d0f3bcd69feddca1e1f882
SHA51294715e3db68ff3699c03871bfa989d40d289d339221b52b3d41fb5efb64bd188a9909b358708b2afed0835ed6a3932db1e99233b80a042f3b1e95ea96839e5dc
-
Filesize
3KB
MD5ebb530336e0a657bcbcbe1c321d0bd14
SHA11f3dcb5f15c39672e04f440528f63a8da0386227
SHA256d4d71eb26f187b16cab9ba801985804b49bf0862e0d0f3bcd69feddca1e1f882
SHA51294715e3db68ff3699c03871bfa989d40d289d339221b52b3d41fb5efb64bd188a9909b358708b2afed0835ed6a3932db1e99233b80a042f3b1e95ea96839e5dc
-
Filesize
3KB
MD5ebb530336e0a657bcbcbe1c321d0bd14
SHA11f3dcb5f15c39672e04f440528f63a8da0386227
SHA256d4d71eb26f187b16cab9ba801985804b49bf0862e0d0f3bcd69feddca1e1f882
SHA51294715e3db68ff3699c03871bfa989d40d289d339221b52b3d41fb5efb64bd188a9909b358708b2afed0835ed6a3932db1e99233b80a042f3b1e95ea96839e5dc
-
Filesize
3KB
MD5ebb530336e0a657bcbcbe1c321d0bd14
SHA11f3dcb5f15c39672e04f440528f63a8da0386227
SHA256d4d71eb26f187b16cab9ba801985804b49bf0862e0d0f3bcd69feddca1e1f882
SHA51294715e3db68ff3699c03871bfa989d40d289d339221b52b3d41fb5efb64bd188a9909b358708b2afed0835ed6a3932db1e99233b80a042f3b1e95ea96839e5dc
-
Filesize
361KB
MD5f11afd3fff5bfd6dbaf7c24a11d79c93
SHA17a3e1220b117a470b85a3dae17ff66d57a1d8b7e
SHA256fe2660ec9e52f0cad5b043221cf2858be07cd1dbe605d006af6c27b65dcac8ce
SHA51215bdc5bb2bb9af8eef0fad9db303dcf1382d532d187027225a0294d6f97a309257ec3577b57c16cbf039fcc3508536eb3dd9990754ce4806b62230dcfc6c0d11