Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe
Resource
win10v2004-20221111-en
General
-
Target
c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe
-
Size
58KB
-
MD5
3333ca5007f8b5720927abea78295870
-
SHA1
885f7fc4591dd88ff94b1dd198925b900ecbd772
-
SHA256
c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c
-
SHA512
8b051b09e21cbd3625b40697728d655943b46c31aee785d09e3c5fe6a82b50f009601f9e55c102391a32d8082ecaa432b5fdf7591d112375104459a527fbfd66
-
SSDEEP
1536:mHMvi7ZSoqGS/vupyOsR5fg9jtR9IuZ70HbBvqki:mbTqDOWeRmq7AVCki
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\ming9bstart = "C:\\Windows\\system\\ming9b090423.exe" c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1116 attrib.exe 832 attrib.exe -
Deletes itself 1 IoCs
pid Process 1104 cmd.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\nb9ming32c090423.dll c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe File created C:\Windows\system\nb9ming32c090423.dll c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe File opened for modification C:\Windows\system\nb9ming32c090423.dll attrib.exe File created C:\Windows\system\ming9b090423.exe c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe File opened for modification C:\Windows\system\ming9b090423.exe c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe File opened for modification C:\Windows\system\ming9b090423.exe attrib.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55578EA1-69C6-11ED-874D-7AEFAD47A2D2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375818583" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe Token: SeSystemtimePrivilege 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe Token: SeSystemtimePrivilege 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe Token: SeDebugPrivilege 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe Token: SeDebugPrivilege 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe Token: SeDebugPrivilege 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 676 iexplore.exe 676 iexplore.exe 704 IEXPLORE.EXE 704 IEXPLORE.EXE 704 IEXPLORE.EXE 704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1116 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 28 PID 1708 wrote to memory of 1116 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 28 PID 1708 wrote to memory of 1116 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 28 PID 1708 wrote to memory of 1116 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 28 PID 1708 wrote to memory of 832 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 30 PID 1708 wrote to memory of 832 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 30 PID 1708 wrote to memory of 832 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 30 PID 1708 wrote to memory of 832 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 30 PID 1708 wrote to memory of 676 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 32 PID 1708 wrote to memory of 676 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 32 PID 1708 wrote to memory of 676 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 32 PID 1708 wrote to memory of 676 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 32 PID 676 wrote to memory of 704 676 iexplore.exe 34 PID 676 wrote to memory of 704 676 iexplore.exe 34 PID 676 wrote to memory of 704 676 iexplore.exe 34 PID 676 wrote to memory of 704 676 iexplore.exe 34 PID 1708 wrote to memory of 676 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 32 PID 1708 wrote to memory of 1104 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 36 PID 1708 wrote to memory of 1104 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 36 PID 1708 wrote to memory of 1104 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 36 PID 1708 wrote to memory of 1104 1708 c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe 36 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1116 attrib.exe 832 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe"C:\Users\Admin\AppData\Local\Temp\c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe"1⤵
- Adds policy Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Windows\system\ming9b090423.exe"2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:1116
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Windows\system\nb9ming32c090423.dll"2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:832
-
-
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:676 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe"2⤵
- Deletes itself
PID:1104
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD58557580ec78abbd4fec919469a54f7c1
SHA1e5f458f658b003b09182fe7d028323e217809c27
SHA2560cda4b313da7cb5300795bad13890a68d84e62c9ee82792517b41e7cb9ed524f
SHA512915283e7f6866d84d792730a8c05e239c1834a6c7543e940d5d15deb0fda5c455bd57922e95a4de6252344e9392e1691017e5bddc87166d84f430d06523a6491
-
Filesize
58KB
MD53333ca5007f8b5720927abea78295870
SHA1885f7fc4591dd88ff94b1dd198925b900ecbd772
SHA256c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c
SHA5128b051b09e21cbd3625b40697728d655943b46c31aee785d09e3c5fe6a82b50f009601f9e55c102391a32d8082ecaa432b5fdf7591d112375104459a527fbfd66
-
Filesize
108KB
MD545921247ff63cc91525920004f989276
SHA1dc417f62a1184bf2de3b4058b47af14ec0a12bbc
SHA2562a905605a173ac6f59e9de5bab1d6cc2da4612bc5cb33375e31c34e43455df75
SHA5129dabba55870ce9da5b7189a8e25f124ba0c1c2e600d0b969b055d399008562e844706c80246c5e3238aff554ae9166ee10e80d88d8a8b1c4741685c14155fe3b