Analysis
-
max time kernel
136s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe
Resource
win10v2004-20220901-en
General
-
Target
3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe
-
Size
118KB
-
MD5
908eb0b6be882690912e0da109beafe8
-
SHA1
5b454581d91b592beb2f83c39f5b06115f6b78e4
-
SHA256
3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4
-
SHA512
a30885f16bfee7122e3e3c4f049c6613f4323bf56a02505beb82f12a86031578588606c369052b0fb276d65e258019d65b44a18a0c9a83a396ab7062852ca39b
-
SSDEEP
1536:5xyv6NVHkMja6NdKiI2dgDqlqIHUsQpe1kIB59MIVNryUKdrw:5YCNVHd/fuugYRQ8BfMzprw
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2708 set thread context of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D7E5B713-502E-11ED-A0EE-E2272FE8D9C1} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2892282838" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991419" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2892282838" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373004739" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991419" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2899001146" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991419" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4540 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 4540 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 4540 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4292 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4540 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe Token: SeDebugPrivilege 1756 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4292 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4292 IEXPLORE.EXE 4292 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2708 wrote to memory of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 PID 2708 wrote to memory of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 PID 2708 wrote to memory of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 PID 2708 wrote to memory of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 PID 2708 wrote to memory of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 PID 2708 wrote to memory of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 PID 2708 wrote to memory of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 PID 2708 wrote to memory of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 PID 2708 wrote to memory of 4540 2708 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 83 PID 4540 wrote to memory of 4380 4540 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 84 PID 4540 wrote to memory of 4380 4540 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 84 PID 4540 wrote to memory of 4380 4540 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 84 PID 4380 wrote to memory of 4292 4380 iexplore.exe 85 PID 4380 wrote to memory of 4292 4380 iexplore.exe 85 PID 4292 wrote to memory of 1756 4292 IEXPLORE.EXE 86 PID 4292 wrote to memory of 1756 4292 IEXPLORE.EXE 86 PID 4292 wrote to memory of 1756 4292 IEXPLORE.EXE 86 PID 4540 wrote to memory of 1756 4540 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 86 PID 4540 wrote to memory of 1756 4540 3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe"C:\Users\Admin\AppData\Local\Temp\3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exeC:\Users\Admin\AppData\Local\Temp\3bc7e923a4a6f76891f41a82951bd9b5b578a05936e103325cfd040b87a4e2f4.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4292 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5d3ff0edeee7d1ea5754d8a290ae01189
SHA1253ee24a4776d30bac0aedd7ea213adea6acb6f9
SHA256e2e542a3681c428c021d38e608dffa43da666f6f3c53f623c21dc184639b222b
SHA512ab14449059ae31856026e8d8cb0ec0b4158da0fd19f2a73940a159574a9084ce6a09ac05fb80ef3ab11cd9b1395dce021872215baced48f9e8a0bf7311000db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD554389504fdee3e188286342be582d180
SHA1cc81c5df22cfd469fb4c708ce6815d48cc31f72a
SHA2569739358bb007889af2199fcb835d94dd36e6abb39792478a2452577c40edc2fa
SHA5126dc9ff4de32be55e7dc3bee636406e4aaa7818a6db40c9689f0c0d4432d54bd1e8886b23f370b5599bcb06c8002ce0ebfe66185d3f6e5856e1d647568bb1bac9