Analysis
-
max time kernel
106s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 15:18
Static task
static1
Behavioral task
behavioral1
Sample
4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe
Resource
win10v2004-20221111-en
General
-
Target
4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe
-
Size
740KB
-
MD5
49c503f108a8d690e917ce8937b1fc10
-
SHA1
4fff4209e2bbd21720887f20917e39f0dff617e8
-
SHA256
4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771
-
SHA512
4529a38d498d4a929d92264745b46aae993fc09b5a894f21cc46a02b78de51d04d7889dff1b4611ec7e1f81cd54861b1d7f79ff2f7001dd9aecbfd538dcb8eeb
-
SSDEEP
12288:tSIiCyhy8QhOnE/4JSIiCyhy8QhOnE/4jXLnyLdS:WLYLN3
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exedescription pid process target process PID 604 set thread context of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da000000000200000000001066000000010000200000008ada4b154aeee9ce971327a8c82580e3801b1883be7b3359d298fd20cdbbcfa6000000000e800000000200002000000021b06cc9459290d127813e913b1a382fed930f204ba0f6d526ada40e87b6996b200000006296f4bcd9d0be8c3d4d04011e3ac61afde72df5eb282fc0faefc48be7eb9454400000003b5ba11f232fb73d706290e721da7e6d34279e4cdc2837dc75bb65c21413128b565eefb03a091c5887124a7a7c61b5a5d347f4acb33bff2212f5a4d97bf8ff40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0030f11dc5fdd801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CD6C341-69B8-11ED-A005-4ED4A804E0FC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375812529" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 772 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exeiexplore.exeIEXPLORE.EXEpid process 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 772 iexplore.exe 772 iexplore.exe 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXEiexplore.exedescription pid process target process PID 604 wrote to memory of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE PID 604 wrote to memory of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE PID 604 wrote to memory of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE PID 604 wrote to memory of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE PID 604 wrote to memory of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE PID 604 wrote to memory of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE PID 604 wrote to memory of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE PID 604 wrote to memory of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE PID 604 wrote to memory of 1716 604 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE PID 1716 wrote to memory of 772 1716 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE iexplore.exe PID 1716 wrote to memory of 772 1716 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE iexplore.exe PID 1716 wrote to memory of 772 1716 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE iexplore.exe PID 1716 wrote to memory of 772 1716 4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE iexplore.exe PID 772 wrote to memory of 1644 772 iexplore.exe IEXPLORE.EXE PID 772 wrote to memory of 1644 772 iexplore.exe IEXPLORE.EXE PID 772 wrote to memory of 1644 772 iexplore.exe IEXPLORE.EXE PID 772 wrote to memory of 1644 772 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe"C:\Users\Admin\AppData\Local\Temp\4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE"C:\Users\Admin\AppData\Local\Temp\4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE"2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:772 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD5e1707375d23c0aff15582ac4bf8a328c
SHA14d269b044630a5ec606b82dbf95b4d207bebe572
SHA25687ef20d86d934d0ea01695e96b3dae45df6506f5ae03c1b65fb8a8cabc899edd
SHA512efbe9f88efe82cfea5b2e36c79399728bbca80ce28d25c92f035b7b3166d3642e4557a8a8206681fdaa62bc68a24d111392152941bab87de911a8cfa9f59f2c5