Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe
Resource
win10v2004-20220901-en
General
-
Target
853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe
-
Size
361KB
-
MD5
507f9d39169fb6f73d292d5675a9e8ce
-
SHA1
439cbf8a80a1678b5730d6df75980a632f19258c
-
SHA256
853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128
-
SHA512
8b4e423ba78789f488ea4e7e3b4bcf6297fa14f347c5745dca8fc24852365abd949917d6c341bce174b8cca3a46128c18f9f37d0997596a7fe730c4e66f61a2d
-
SSDEEP
6144:eflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:eflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2036 yuqiwsojfylhdzrn.exe 1468 CreateProcess.exe 760 atqnjyrolh.exe 1352 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 2036 yuqiwsojfylhdzrn.exe 2036 yuqiwsojfylhdzrn.exe 760 atqnjyrolh.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2000 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000c674099b86240b119f521d03b86b65eb96d46a4e45c64b0a016335465c638781000000000e80000000020000200000009da47fcd24520412bf3dc236e0ef6a88d42f4eaecfa0a8408d4abebd41af7467200000005335db237de5013dc5a1e29ff7aabf5a5590cb85bc8e9cd6a8593273b708254c400000001c59455d7a0c1ee5717e4c3370e1133f59f73b7adc578937918768817247c10d329ef6c252c83373ddd6f2f28339874aa3ec57d6392fb60cde32b16406256836 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373042339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b78f4293e4d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DC6B241-5086-11ED-8538-4A4A572A2DE9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 2036 yuqiwsojfylhdzrn.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 2036 yuqiwsojfylhdzrn.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 2036 yuqiwsojfylhdzrn.exe 2036 yuqiwsojfylhdzrn.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 2036 yuqiwsojfylhdzrn.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 2036 yuqiwsojfylhdzrn.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 2036 yuqiwsojfylhdzrn.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 760 atqnjyrolh.exe 760 atqnjyrolh.exe 760 atqnjyrolh.exe 760 atqnjyrolh.exe 760 atqnjyrolh.exe 760 atqnjyrolh.exe 760 atqnjyrolh.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 960 iexplore.exe 960 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2036 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 28 PID 1036 wrote to memory of 2036 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 28 PID 1036 wrote to memory of 2036 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 28 PID 1036 wrote to memory of 2036 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 28 PID 1036 wrote to memory of 960 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 29 PID 1036 wrote to memory of 960 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 29 PID 1036 wrote to memory of 960 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 29 PID 1036 wrote to memory of 960 1036 853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe 29 PID 960 wrote to memory of 848 960 iexplore.exe 31 PID 960 wrote to memory of 848 960 iexplore.exe 31 PID 960 wrote to memory of 848 960 iexplore.exe 31 PID 960 wrote to memory of 848 960 iexplore.exe 31 PID 2036 wrote to memory of 1468 2036 yuqiwsojfylhdzrn.exe 33 PID 2036 wrote to memory of 1468 2036 yuqiwsojfylhdzrn.exe 33 PID 2036 wrote to memory of 1468 2036 yuqiwsojfylhdzrn.exe 33 PID 2036 wrote to memory of 1468 2036 yuqiwsojfylhdzrn.exe 33 PID 760 wrote to memory of 1352 760 atqnjyrolh.exe 35 PID 760 wrote to memory of 1352 760 atqnjyrolh.exe 35 PID 760 wrote to memory of 1352 760 atqnjyrolh.exe 35 PID 760 wrote to memory of 1352 760 atqnjyrolh.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe"C:\Users\Admin\AppData\Local\Temp\853cd957733ed160556b01c74087f0db7f7396efc66b4a2886ab3a5cd422a128.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Temp\yuqiwsojfylhdzrn.exeC:\Temp\yuqiwsojfylhdzrn.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\atqnjyrolh.exe ups_run3⤵
- Executes dropped EXE
PID:1468 -
C:\Temp\atqnjyrolh.exeC:\Temp\atqnjyrolh.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1352 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:2000
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:960 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:848
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5714ff31e468a4b2eca0148383192fccf
SHA11ff8f961f3389439912a024912da1c91b6f1dd79
SHA256bb857f8ce8b59e04ddbb930c3453487cd52f117554ed275a8d7b3d0319202696
SHA51292028004b4339823b205776e78990900556bef824d3a355fe9fe1a85722cab0b7ab7ede5b0b997f6dd1332a9869486d100c17ced7a6081a89e682ba12f64b0f6
-
Filesize
3KB
MD5714ff31e468a4b2eca0148383192fccf
SHA11ff8f961f3389439912a024912da1c91b6f1dd79
SHA256bb857f8ce8b59e04ddbb930c3453487cd52f117554ed275a8d7b3d0319202696
SHA51292028004b4339823b205776e78990900556bef824d3a355fe9fe1a85722cab0b7ab7ede5b0b997f6dd1332a9869486d100c17ced7a6081a89e682ba12f64b0f6
-
Filesize
361KB
MD5d6f15aef7f3fb67e624ba438dd72d90f
SHA17f906e4c17ab97f6d1b76fcae6f0bdcbc9b4d784
SHA25668c77d5cd0a398924d593ef30e2fa48e950d128369383037482b71dd777d1822
SHA512852ac9fd861fcc50711b124cb235da8f5198dea489513be5611ad6a8f9df7cb3f153f30bf3626a56ecd5739b248a2c0875ea6569d077501e67cf6ad235d03ec2
-
Filesize
361KB
MD5852161b4bba37b46d39866423c35ab94
SHA11fe4445f4a879061c445e6566339732dc9d5df1b
SHA256e770c7bc94e1485f4d487d0a9aa090abed9c7e97afd5c06f8b5b06f4e00a810f
SHA512abd185cceba5c40810a991a73537e956e6f62095fd37d2013c9f16c7e4050f058a9175c597d6c64b04455d767e3664f8e6f58d64eb3739e7f2bf754141dad5b3
-
Filesize
361KB
MD5852161b4bba37b46d39866423c35ab94
SHA11fe4445f4a879061c445e6566339732dc9d5df1b
SHA256e770c7bc94e1485f4d487d0a9aa090abed9c7e97afd5c06f8b5b06f4e00a810f
SHA512abd185cceba5c40810a991a73537e956e6f62095fd37d2013c9f16c7e4050f058a9175c597d6c64b04455d767e3664f8e6f58d64eb3739e7f2bf754141dad5b3
-
Filesize
603B
MD5619371bccfe95d504a17a68f5b3da7ce
SHA1482d5ab3723865f30bb08946c47195a9dfdfe18f
SHA256556160458a0cca929ae48d67018fa844461eb7d032434d9942c7a6296ea2edd4
SHA51217f59d512ea98f81685848d3e8aa1fe24a284041607d1f13633856d7b1ed37e12819a493bb00ab1caa427e4dad11072678fc8d7db7f386abac750ed827b13ccd
-
Filesize
3KB
MD5714ff31e468a4b2eca0148383192fccf
SHA11ff8f961f3389439912a024912da1c91b6f1dd79
SHA256bb857f8ce8b59e04ddbb930c3453487cd52f117554ed275a8d7b3d0319202696
SHA51292028004b4339823b205776e78990900556bef824d3a355fe9fe1a85722cab0b7ab7ede5b0b997f6dd1332a9869486d100c17ced7a6081a89e682ba12f64b0f6
-
Filesize
3KB
MD5714ff31e468a4b2eca0148383192fccf
SHA11ff8f961f3389439912a024912da1c91b6f1dd79
SHA256bb857f8ce8b59e04ddbb930c3453487cd52f117554ed275a8d7b3d0319202696
SHA51292028004b4339823b205776e78990900556bef824d3a355fe9fe1a85722cab0b7ab7ede5b0b997f6dd1332a9869486d100c17ced7a6081a89e682ba12f64b0f6
-
Filesize
3KB
MD5714ff31e468a4b2eca0148383192fccf
SHA11ff8f961f3389439912a024912da1c91b6f1dd79
SHA256bb857f8ce8b59e04ddbb930c3453487cd52f117554ed275a8d7b3d0319202696
SHA51292028004b4339823b205776e78990900556bef824d3a355fe9fe1a85722cab0b7ab7ede5b0b997f6dd1332a9869486d100c17ced7a6081a89e682ba12f64b0f6
-
Filesize
3KB
MD5714ff31e468a4b2eca0148383192fccf
SHA11ff8f961f3389439912a024912da1c91b6f1dd79
SHA256bb857f8ce8b59e04ddbb930c3453487cd52f117554ed275a8d7b3d0319202696
SHA51292028004b4339823b205776e78990900556bef824d3a355fe9fe1a85722cab0b7ab7ede5b0b997f6dd1332a9869486d100c17ced7a6081a89e682ba12f64b0f6
-
Filesize
361KB
MD5852161b4bba37b46d39866423c35ab94
SHA11fe4445f4a879061c445e6566339732dc9d5df1b
SHA256e770c7bc94e1485f4d487d0a9aa090abed9c7e97afd5c06f8b5b06f4e00a810f
SHA512abd185cceba5c40810a991a73537e956e6f62095fd37d2013c9f16c7e4050f058a9175c597d6c64b04455d767e3664f8e6f58d64eb3739e7f2bf754141dad5b3