Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 10:55
Behavioral task
behavioral1
Sample
60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe
Resource
win7-20221111-en
General
-
Target
60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe
-
Size
111KB
-
MD5
41257bd334b640efc270a7b20ecca100
-
SHA1
9250277d7ab6e44faddb34cf39184a30af5cb1d2
-
SHA256
60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4
-
SHA512
30d2217a1b784a18f42459bcbdefeff6b895f56e1b7dd4001817087db0a850ee85f3e5e1ab632528cdec6e71dc0e7194e034e508f694db6705fc728e99516519
-
SSDEEP
3072:fROzoTq0+RO7IwnY5UcObZ5GQBHlJVvqljq:pkdNwBeUfLBH0
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3596 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4Srv.exe 4992 DesktopLayer.exe 1424 DesktopLayerSrv.exe -
resource yara_rule behavioral2/files/0x000a000000022e15-133.dat upx behavioral2/files/0x000a000000022e15-134.dat upx behavioral2/memory/3596-136-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x000c000000022e19-138.dat upx behavioral2/memory/4308-139-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x0008000000022e22-142.dat upx behavioral2/files/0x000c000000022e19-141.dat upx behavioral2/files/0x0008000000022e22-143.dat upx behavioral2/memory/1424-145-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/4992-144-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px6FD6.tmp DesktopLayerSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe DesktopLayerSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\px6F1A.tmp 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\px6F1A.tmp 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe File created C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe DesktopLayer.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "920047677" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "920047677" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{610A07B4-6993-11ED-B8D8-628A2E7D3C83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1348953880" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997920" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997920" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375193605" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{610C681F-6993-11ED-B8D8-628A2E7D3C83} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997920" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997920" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1348953880" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4992 DesktopLayer.exe 4992 DesktopLayer.exe 4992 DesktopLayer.exe 4992 DesktopLayer.exe 1424 DesktopLayerSrv.exe 1424 DesktopLayerSrv.exe 1424 DesktopLayerSrv.exe 1424 DesktopLayerSrv.exe 4992 DesktopLayer.exe 4992 DesktopLayer.exe 1424 DesktopLayerSrv.exe 1424 DesktopLayerSrv.exe 4992 DesktopLayer.exe 4992 DesktopLayer.exe 1424 DesktopLayerSrv.exe 1424 DesktopLayerSrv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1328 iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1328 iexplore.exe 1584 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1584 iexplore.exe 1584 iexplore.exe 1328 iexplore.exe 1328 iexplore.exe 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE 3696 IEXPLORE.EXE 3696 IEXPLORE.EXE 3696 IEXPLORE.EXE 3696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4308 wrote to memory of 3596 4308 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe 86 PID 4308 wrote to memory of 3596 4308 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe 86 PID 4308 wrote to memory of 3596 4308 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe 86 PID 4308 wrote to memory of 4992 4308 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe 87 PID 4308 wrote to memory of 4992 4308 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe 87 PID 4308 wrote to memory of 4992 4308 60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe 87 PID 4992 wrote to memory of 1424 4992 DesktopLayer.exe 88 PID 4992 wrote to memory of 1424 4992 DesktopLayer.exe 88 PID 4992 wrote to memory of 1424 4992 DesktopLayer.exe 88 PID 4992 wrote to memory of 1328 4992 DesktopLayer.exe 89 PID 4992 wrote to memory of 1328 4992 DesktopLayer.exe 89 PID 1424 wrote to memory of 1584 1424 DesktopLayerSrv.exe 90 PID 1424 wrote to memory of 1584 1424 DesktopLayerSrv.exe 90 PID 1328 wrote to memory of 3696 1328 iexplore.exe 92 PID 1328 wrote to memory of 3696 1328 iexplore.exe 92 PID 1328 wrote to memory of 3696 1328 iexplore.exe 92 PID 1584 wrote to memory of 1204 1584 iexplore.exe 91 PID 1584 wrote to memory of 1204 1584 iexplore.exe 91 PID 1584 wrote to memory of 1204 1584 iexplore.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe"C:\Users\Admin\AppData\Local\Temp\60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4Srv.exeC:\Users\Admin\AppData\Local\Temp\60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4Srv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3596
-
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"C:\Program Files (x86)\Microsoft\DesktopLayerSrv.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1584 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3696
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD541257bd334b640efc270a7b20ecca100
SHA19250277d7ab6e44faddb34cf39184a30af5cb1d2
SHA25660008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4
SHA51230d2217a1b784a18f42459bcbdefeff6b895f56e1b7dd4001817087db0a850ee85f3e5e1ab632528cdec6e71dc0e7194e034e508f694db6705fc728e99516519
-
Filesize
111KB
MD541257bd334b640efc270a7b20ecca100
SHA19250277d7ab6e44faddb34cf39184a30af5cb1d2
SHA25660008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4
SHA51230d2217a1b784a18f42459bcbdefeff6b895f56e1b7dd4001817087db0a850ee85f3e5e1ab632528cdec6e71dc0e7194e034e508f694db6705fc728e99516519
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5cb295ed32b0acd9eac87bcc961fb315a
SHA1a580f2d38c9d1611e25b6aaa3d79b54eb34d3ebe
SHA256980abeaa872503211925db8acf8bdcdff0bc3c6deb2182fd698f6a444d2625be
SHA512974f48bdfb8ea90a49cfa25cacc98c9a145702f4e4967dd6ffddd5eaee6144189499682e80b342708e04f812006314b04e5715492170d0f63c7b0530e9cd399a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5aab6d25336f6d9c61a6013086221cb8a
SHA1998d62b78a85e738c4acec19e54ce3d95b2fc032
SHA2567dd523c59ef7eb43b14dd915e9742e4875046523ce30077af218af3a910f90cd
SHA512137cf7441e893c2ff3c384310f1919d6e04a4934a98c40da5c77f28b52d358b4c7dd30f856f8c1dd3d025128f640058512b3458e2b2514d68a0d363f5e5ebf93
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{610A07B4-6993-11ED-B8D8-628A2E7D3C83}.dat
Filesize5KB
MD584d0a2a2725f27b42e3cde20dea45e8e
SHA1a58c6c15790caf9aa30a10d3dc049a4c21fd37a1
SHA256b6f0c0a19a427a82e90c5a8af1a743ce43d4a9db890d68dbcb03637bacd8bb1f
SHA5120a927a5efe6fde8870179e7640e310fe723695171c8c23c82fd91900aa37179b58bd6805602de04405c68d9433f8b5125b698afa9ee012b7a9a7921af110ea03
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{610C681F-6993-11ED-B8D8-628A2E7D3C83}.dat
Filesize5KB
MD5fd059496c25b263f257afffd3269497a
SHA11028f2caf4500332d5b5b26f8f065459953ff5e1
SHA256112d147deac50500cfe1eafe0b2dd16dbe81827c6b30903f3c14759237daa818
SHA512bd1abae4cec2e06cc0cdc635b5f6c09a7404e1cb94552df94773ddb4c332dedb3a5bd79c0e9b773c866b8d059a4435489e17e15c4c4e68839d7a23f3a80beb53
-
C:\Users\Admin\AppData\Local\Temp\60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4Srv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Temp\60008e31017441f72ffc118bcca476e24c1df74623747ea226551055c7da9ed4Srv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a