Analysis
-
max time kernel
111s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 12:50
Static task
static1
Behavioral task
behavioral1
Sample
5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe
Resource
win10v2004-20220812-en
General
-
Target
5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe
-
Size
292KB
-
MD5
0cce48f3e156333bf22e3305e4592de0
-
SHA1
34f80185ccc4e98c70d2ce171421137e5eef9599
-
SHA256
5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de
-
SHA512
081942feef4a7cfba4a1f8788afd5641ea08ee8c61157f1725e6a21fe86c953487c7ca6fcb037a838524c0a3a4fa336de611b10e0d3fb53b2e4503d3557c7370
-
SSDEEP
6144:spFXJCEGWhXGwOIY9xzR9kCN5tfJCecPc3NeFc:aJCEGWGuYrN5tf8eck3wF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2040 win76.exe -
Loads dropped DLL 2 IoCs
pid Process 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\runAPI24 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\runAPI89.exe\"" 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 900 set thread context of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17F3A5F1-5F1F-11ED-A6C3-FE72C9E2D9C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00320032cf3d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374647244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf00000000020000000000106600000001000020000000716b604d93cff92b6d94b34a9f58cae5870a57247e43f2c9e96efc289babde86000000000e80000000020000200000006646462295c59277a7aba70c5b7267bc58f2f6a3cf107899a0730a1bedeb813a20000000578f7d430a2c41bb5536ea7d014516f70fe9ce16d1f6078dfb62e57d7d1dc6c44000000039775f33be10d10f960177eee6356ba7aae72bce87bc8688e6377447d78582e40702c55a4480f5f00af91f08d6b405ede761f936c7a28bd62af579e63d1f4c4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 944 iexplore.exe 944 iexplore.exe 892 IEXPLORE.EXE 892 IEXPLORE.EXE 892 IEXPLORE.EXE 892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 900 wrote to memory of 2040 900 5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe 27 PID 2040 wrote to memory of 944 2040 win76.exe 28 PID 2040 wrote to memory of 944 2040 win76.exe 28 PID 2040 wrote to memory of 944 2040 win76.exe 28 PID 2040 wrote to memory of 944 2040 win76.exe 28 PID 944 wrote to memory of 892 944 iexplore.exe 30 PID 944 wrote to memory of 892 944 iexplore.exe 30 PID 944 wrote to memory of 892 944 iexplore.exe 30 PID 944 wrote to memory of 892 944 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe"C:\Users\Admin\AppData\Local\Temp\5dd2390222c5e0b3476122fb9305932faa33e311a6ab062218c55be911a0f6de.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\win76.exeC:\Users\Admin\AppData\Local\Temp\win76.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=win76.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:944 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:892
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea
-
Filesize
597B
MD53a58c94dd012b74f679be6ff12d574f9
SHA16295da7e1e28a0f389d518c19f836ec877347e13
SHA2562d5bc6516a3afffc357c540303583eba77ab427529d2650eae7d3c793cef0324
SHA5125cd3193b1abb9b39081177b41271ece5ca0cc711d33ac6f90e86f7c76aaf7369214b6ca8c8c0d4d62d783dee0b320f0cf0a3c5bd8740eecd43be88e872f6a6e1
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea