Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 05:22
Behavioral task
behavioral1
Sample
6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe
Resource
win10v2004-20220901-en
General
-
Target
6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe
-
Size
112KB
-
MD5
92c030513aa62b2885915c7a03378160
-
SHA1
babc94e5ba0a8b8f4e82a7059d6865cc56c4af18
-
SHA256
6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5
-
SHA512
8a1088de008329da8ad8790ac42f394e26edd872319c9fb91deb476f72f4f49695842c52267da0336b6c04118a64433c83f91bab6f301821bffe45d5245ebdd8
-
SSDEEP
1536:5D7Fuc0TZ08z3jeeXNXS3zRgyaiQPEigSsnHSFfb0IL4+mLTtyX2XO:1g1Nfz3jeedmzf5igSsnHAIO25yG+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3536 Udat11123.exe -
resource yara_rule behavioral2/memory/4924-134-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0003000000022e27-136.dat upx behavioral2/files/0x0003000000022e27-137.dat upx behavioral2/memory/3536-139-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4924-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3536-215-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4924-218-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Udat11123.exe 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe File opened for modification C:\Windows\Udat11123.exe 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3056311034" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993536" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E170D0D7-5873-11ED-A0EE-CE8FEF2919E2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30993536" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3056311034" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40067db880ecd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373914001" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3068644344" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a88db880ecd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000005d0eb882fd904d27617f42f3e0b3a40bf5ff08d9b4a6ca50b3c710d7eabd40000000000e80000000020000200000005dba08527dbf07868184f312cbfeca16324b01aa607400068c43252f58ee6008200000002906cb7af46ed43f7f451a31b9420ba5b768b0547e11be9b625157bb54b4600240000000d0ea38227574b0d545696116384712a52b18c70845f6e5f550ac2693e3d3483c5430267549c80bdc622b6de43bee2d97280f783d226d0ec50180f33a0a3efe41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d7906000000000200000000001066000000010000200000007c501c356d06dcdcf80529fb768e8c3ed908ecf0a2c33f7f725c7ea18c817f99000000000e800000000200002000000000b090840860b3f35303b6069a64217a7069735693a68a263102253917d1e7bd200000003d5111afeb5f828cd170412e2cdd4fbe8b967f32037fbaca0934a9d61eb9fe194000000072248e6ccfee972ae0b9a9c9739b3d150632297af4f08832804e43929e78fcfc7e41ba3567c815ea5a6a81ef502b01c998abbc308ded142d6b8f4fb416cf2ceb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993536" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4924 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe 4924 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5088 iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5088 iexplore.exe 3536 Udat11123.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4924 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe 3536 Udat11123.exe 5088 iexplore.exe 5088 iexplore.exe 3748 IEXPLORE.EXE 3748 IEXPLORE.EXE 3748 IEXPLORE.EXE 3748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4924 wrote to memory of 3536 4924 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe 83 PID 4924 wrote to memory of 3536 4924 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe 83 PID 4924 wrote to memory of 3536 4924 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe 83 PID 4924 wrote to memory of 5088 4924 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe 84 PID 4924 wrote to memory of 5088 4924 6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe 84 PID 5088 wrote to memory of 3748 5088 iexplore.exe 85 PID 5088 wrote to memory of 3748 5088 iexplore.exe 85 PID 5088 wrote to memory of 3748 5088 iexplore.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe"C:\Users\Admin\AppData\Local\Temp\6b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\Udat11123.exeC:\Windows\Udat11123.exe auto2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3536
-
-
C:\progra~1\Intern~1\iexplore.exeC:\\progra~1\\Intern~1\\iexplore.exe http://jianqiang-zhe.com/AddSetup.asp?567€UQ44457€7€5437436466$8>9;>49$TQ€<82⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5088 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD55ddb1febcd291eb59d3d67d24a05bfd0
SHA1fe957affe27cb991f332e7f5c86d3a15359bd3b9
SHA256ec45a385c906b3d925ebbe6532d10adec9a14c1733c756c64db5133bd9d88dcb
SHA51262d00893402fae125ae3428da2495b0eb864b125f975cd887f894f7298a4a86f361cf50aaa7c9b69f3dcb734a950c43472778ea4062b3146c3de5623d08dcd21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD593499a7fc283c6d94e32de4a42211fbf
SHA155aa880ae1ca73ece1476a2b6aad9aae82aae505
SHA256ce15d4c7376be6abe89a1f1df2a28ea4a249385f7bbd1211abec4bde03a3e13a
SHA512b2b567538a0850512c50288263e18f39d0e8ceaee8d6bb91e12951f12ec2020a81d5c4fe083685415d83a831aa06007dea14e5ac15ce286b933d92da85e7af39
-
Filesize
112KB
MD592c030513aa62b2885915c7a03378160
SHA1babc94e5ba0a8b8f4e82a7059d6865cc56c4af18
SHA2566b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5
SHA5128a1088de008329da8ad8790ac42f394e26edd872319c9fb91deb476f72f4f49695842c52267da0336b6c04118a64433c83f91bab6f301821bffe45d5245ebdd8
-
Filesize
112KB
MD592c030513aa62b2885915c7a03378160
SHA1babc94e5ba0a8b8f4e82a7059d6865cc56c4af18
SHA2566b0fc1e2e210d927c368480e343b46863ea8289ff7bb9e566e64ae1dbf4d91b5
SHA5128a1088de008329da8ad8790ac42f394e26edd872319c9fb91deb476f72f4f49695842c52267da0336b6c04118a64433c83f91bab6f301821bffe45d5245ebdd8