Analysis
-
max time kernel
105s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe
Resource
win10v2004-20220812-en
General
-
Target
68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe
-
Size
389KB
-
MD5
060e63630afce5acbb77168b488a8f40
-
SHA1
26da8a7728985a42a72dbf50b38d6533394ae51f
-
SHA256
68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1
-
SHA512
9f8d13ff55cc57d5da9130b849ae3b19055a6864ab3a385b61dab7044c044fb52c52b2d34f4d839ac3d8cda3a1df7914f828566cc692387ab4d24fb17ee4a981
-
SSDEEP
6144:H5BJvadeLnJiYZ+up5BmmbqaRhmNN5HcdOHjPvfALvbCHI:H/AmiwZ/JqVcW7ALvbEI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-55.dat upx behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-58.dat upx behavioral1/memory/1896-65-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1896-66-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74514A01-5E5C-11ED-8B55-6651945CA213} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{744F7541-5E5C-11ED-8B55-6651945CA213} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374563652" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1708 iexplore.exe 1372 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 1372 iexplore.exe 1372 iexplore.exe 1708 iexplore.exe 1708 iexplore.exe 1552 IEXPLORE.EXE 1804 IEXPLORE.EXE 1552 IEXPLORE.EXE 1804 IEXPLORE.EXE 1552 IEXPLORE.EXE 1552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1896 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 28 PID 1100 wrote to memory of 1896 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 28 PID 1100 wrote to memory of 1896 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 28 PID 1100 wrote to memory of 1896 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 28 PID 1896 wrote to memory of 1372 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 29 PID 1896 wrote to memory of 1372 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 29 PID 1896 wrote to memory of 1372 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 29 PID 1896 wrote to memory of 1372 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 29 PID 1896 wrote to memory of 1708 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 30 PID 1896 wrote to memory of 1708 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 30 PID 1896 wrote to memory of 1708 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 30 PID 1896 wrote to memory of 1708 1896 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe 30 PID 1100 wrote to memory of 1232 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 31 PID 1100 wrote to memory of 1232 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 31 PID 1100 wrote to memory of 1232 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 31 PID 1100 wrote to memory of 1232 1100 68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe 31 PID 1372 wrote to memory of 1552 1372 iexplore.exe 33 PID 1372 wrote to memory of 1552 1372 iexplore.exe 33 PID 1372 wrote to memory of 1552 1372 iexplore.exe 33 PID 1372 wrote to memory of 1552 1372 iexplore.exe 33 PID 1708 wrote to memory of 1804 1708 iexplore.exe 34 PID 1708 wrote to memory of 1804 1708 iexplore.exe 34 PID 1708 wrote to memory of 1804 1708 iexplore.exe 34 PID 1708 wrote to memory of 1804 1708 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe"C:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exeC:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1372 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{744F7541-5E5C-11ED-8B55-6651945CA213}.dat
Filesize4KB
MD58f3829c2a49b31d3e133af20db44d829
SHA1c1f24d749b6f465e620675140719a33e791b1186
SHA256d3a35a775d80807efb9a466f23209b1ffbad282a38ddf2effca48d8cde30b34a
SHA512578671b68a5048ba77013bfe5578184ca2babb5856b7581cd86b98fdb5acd1061b8179696ca03c74bb25418db420bf75aa278f4ad4cc9297bf0e580061aee57a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{74514A01-5E5C-11ED-8B55-6651945CA213}.dat
Filesize5KB
MD5d5fd03245ed50fa67e18bb2daca01add
SHA1da407a701274f6fc0a8ef8bdd6c84b80e9c19c86
SHA2566f3254d5de11e306efc74a1bdcfc389b5343833baa3beb7678e012e4f93253a1
SHA51244bfca491a5a8088a2b22d5c114f9a0462407d9fa88941d89e9e665edb88cad322cf7a8d596de0269ba072ec9fe57c3b4fcf4c5034a4166de2ed9cb6f83c4b3b
-
C:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe
Filesize173KB
MD5368c6653018fffc8902b3404f1330c5f
SHA111222508abc7a16e6d5004b92645c22173bd805c
SHA256322b8fe73a8f4d60627aac70bad1e724e2a8e4b605ac3b1cec96cd9029591825
SHA512108afbb6af60e2fd445cc9494b901b604ec353b39c1d6e36a47f27a877d0696241b128134c4471c22f94bde2adffab0efb871b80708369412d9179f3b672a756
-
Filesize
608B
MD573d04ab9d8f2742c74575e42add4f2d0
SHA1d42ed458f703dbe8b58e1f6da2ea7528d1799c81
SHA256bba4a5e50c1421fb356f2d8513bddffdc0119031f4a03d814b2f788327c0b4ed
SHA512e7e4115e6ae602c72b853c4ba46f7d1a5acf9c4f82977a14286212411f28dd71d2347d29bbf8547f83fe433e3e0817c5c06090d17284dd35af8bed357b6e7102
-
\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe
Filesize173KB
MD5368c6653018fffc8902b3404f1330c5f
SHA111222508abc7a16e6d5004b92645c22173bd805c
SHA256322b8fe73a8f4d60627aac70bad1e724e2a8e4b605ac3b1cec96cd9029591825
SHA512108afbb6af60e2fd445cc9494b901b604ec353b39c1d6e36a47f27a877d0696241b128134c4471c22f94bde2adffab0efb871b80708369412d9179f3b672a756
-
\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe
Filesize173KB
MD5368c6653018fffc8902b3404f1330c5f
SHA111222508abc7a16e6d5004b92645c22173bd805c
SHA256322b8fe73a8f4d60627aac70bad1e724e2a8e4b605ac3b1cec96cd9029591825
SHA512108afbb6af60e2fd445cc9494b901b604ec353b39c1d6e36a47f27a877d0696241b128134c4471c22f94bde2adffab0efb871b80708369412d9179f3b672a756