Analysis
-
max time kernel
109s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe
Resource
win10v2004-20220812-en
General
-
Target
262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe
-
Size
322KB
-
MD5
910159ab6797ef989d76a01b898bd390
-
SHA1
f05f392337d44c50611fc12e1dbc6f72a51d5094
-
SHA256
262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5
-
SHA512
0d7ff99442050c1106dd828309c05fc4040877d4579bc29a19b534dc79b659cd89a77c1b6caf734c5f4866dc42d2ca8ee6c183542163811b16788efb05cf8bb2
-
SSDEEP
6144:S5BgvadeLnJiYZ+up5BmmbKaRwmNN5+Scc9PoXI0l4Bp/rZl+2v12:S//miwZ/JKjJGwXI9pTL+kM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-55.dat upx behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/files/0x000c0000000054a8-58.dat upx behavioral1/memory/836-62-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/836-66-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{261B1DE1-594B-11ED-BD75-FAF5FAF3A79A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{261AF6D1-594B-11ED-BD75-FAF5FAF3A79A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374006474" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1700 iexplore.exe 956 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 1700 iexplore.exe 1700 iexplore.exe 956 iexplore.exe 956 iexplore.exe 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1480 wrote to memory of 836 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 27 PID 1480 wrote to memory of 836 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 27 PID 1480 wrote to memory of 836 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 27 PID 1480 wrote to memory of 836 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 27 PID 1480 wrote to memory of 2020 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 28 PID 1480 wrote to memory of 2020 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 28 PID 1480 wrote to memory of 2020 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 28 PID 1480 wrote to memory of 2020 1480 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe 28 PID 836 wrote to memory of 1700 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 29 PID 836 wrote to memory of 1700 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 29 PID 836 wrote to memory of 1700 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 29 PID 836 wrote to memory of 1700 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 29 PID 836 wrote to memory of 956 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 30 PID 836 wrote to memory of 956 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 30 PID 836 wrote to memory of 956 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 30 PID 836 wrote to memory of 956 836 262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe 30 PID 956 wrote to memory of 1464 956 iexplore.exe 32 PID 956 wrote to memory of 1464 956 iexplore.exe 32 PID 956 wrote to memory of 1464 956 iexplore.exe 32 PID 956 wrote to memory of 1464 956 iexplore.exe 32 PID 1700 wrote to memory of 1460 1700 iexplore.exe 33 PID 1700 wrote to memory of 1460 1700 iexplore.exe 33 PID 1700 wrote to memory of 1460 1700 iexplore.exe 33 PID 1700 wrote to memory of 1460 1700 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe"C:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exeC:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{261AF6D1-594B-11ED-BD75-FAF5FAF3A79A}.dat
Filesize3KB
MD544f10063f817a3234fa5003076935441
SHA184b2064aec144042eae5f7316a948b4dbba7aee8
SHA256e94b5834b14feb9ea7b27aa93c156b988cd8049bac6404d7faf3ed6b16539d34
SHA5129b7cd1d3810956f8d7cd267f10de059f78337dfe52e99b5c742c656a551cfcf6c9190d490cb17c89290e6360d2f7cbf8d5bbfa4d3cef259d320bbb3a2aad1cbe
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{261B1DE1-594B-11ED-BD75-FAF5FAF3A79A}.dat
Filesize3KB
MD5747c61fb5662eee8935feef97b9fa9f0
SHA17d884ea6b76e0125a75200b73dddcbde0ff19208
SHA2561de4671e79d877a91e5108d17b504d3327b0a4087592232bc4c58de71d894dc1
SHA512bec795ee99845fc93e10228e60687a5a413fa25088a7871e30e31140bb6e5d8f9f66d0b97b636e3dc351634af35128c4396deb5eb234ea0249d4dd0eb0cd428b
-
C:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe
Filesize106KB
MD5db92102c142a97620d0f02b3321d235b
SHA184adf0da0cfa131b61a23cf26719b5d0c75702a9
SHA25612dc8f962b54cbf925146db55709c9ad8465e392aede3a5095f74e7ca6ade2a5
SHA51204bbb8ca5e5e63e85da4c4a9de8f46352cb9437005c0cae014da1d61c58916584a284fb7fba21b06f963de440362e150b6f2ef5d69143fd6a187c0712bf28d65
-
Filesize
535B
MD51a2aa2c015827d992d431c0e647dba7f
SHA14c265a0d25492c68f26408b7b223a59b0e81e4da
SHA256c8716cb6a8bbde86b866d04f972777622fd1998942c5ed6cef593fa427a4b06c
SHA512b415d074714ffa31fbca315686a94b6710c2b90f92537af3124f186240f66be2d9cb5c359ed43b97c327afd4f5b02ed6c9d987f80d52e92d3393472fa4094469
-
\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe
Filesize106KB
MD5db92102c142a97620d0f02b3321d235b
SHA184adf0da0cfa131b61a23cf26719b5d0c75702a9
SHA25612dc8f962b54cbf925146db55709c9ad8465e392aede3a5095f74e7ca6ade2a5
SHA51204bbb8ca5e5e63e85da4c4a9de8f46352cb9437005c0cae014da1d61c58916584a284fb7fba21b06f963de440362e150b6f2ef5d69143fd6a187c0712bf28d65
-
\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe
Filesize106KB
MD5db92102c142a97620d0f02b3321d235b
SHA184adf0da0cfa131b61a23cf26719b5d0c75702a9
SHA25612dc8f962b54cbf925146db55709c9ad8465e392aede3a5095f74e7ca6ade2a5
SHA51204bbb8ca5e5e63e85da4c4a9de8f46352cb9437005c0cae014da1d61c58916584a284fb7fba21b06f963de440362e150b6f2ef5d69143fd6a187c0712bf28d65