Analysis
-
max time kernel
23s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:08
Static task
static1
Behavioral task
behavioral1
Sample
157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe
Resource
win10v2004-20220812-en
General
-
Target
157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe
-
Size
294KB
-
MD5
44df3d079e11faf3510b7d884a6d9c2d
-
SHA1
5ee87ce44a0c5c70286081b020b54870901d2c60
-
SHA256
157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d
-
SHA512
b323b555655cd3cedd45e76b9a0c61ff7101e19b8341abc146f1d472f9bc3c1cbe7d3e0cae056506bb6fdec5ce9c309751a4f58756e04e8284dd0cf032e795b2
-
SSDEEP
6144:cdYgxDh5luzMm2mBiXS6S9JSelDyX2UFLstcAyXRU0ODDoB:tgxDh3uLTKSH9flD74sK60ODDoB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmppid process 1260 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp -
Loads dropped DLL 3 IoCs
Processes:
157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmppid process 1124 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe 1260 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp 1260 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp -
Processes:
regedit.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
regedit.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.hae123.com" regedit.exe -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 936 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmppid process 1260 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmpdescription pid process target process PID 1124 wrote to memory of 1260 1124 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp PID 1124 wrote to memory of 1260 1124 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp PID 1124 wrote to memory of 1260 1124 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp PID 1124 wrote to memory of 1260 1124 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp PID 1260 wrote to memory of 936 1260 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp regedit.exe PID 1260 wrote to memory of 936 1260 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp regedit.exe PID 1260 wrote to memory of 936 1260 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp regedit.exe PID 1260 wrote to memory of 936 1260 157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp regedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe"C:\Users\Admin\AppData\Local\Temp\157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\is-3B2TL.tmp\157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp"C:\Users\Admin\AppData\Local\Temp\is-3B2TL.tmp\157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp" /SL5="$70122,51915,51712,C:\Users\Admin\AppData\Local\Temp\157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\Regedit.exe" -s C:\Adobe\info.desc3⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Runs regedit.exe
PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5a0fd44bf16c285a195d371ba2404dc0a
SHA11880991f3f49d2f35e86ce2575d7535517a10f28
SHA256686ea1ff46449d5412e6454ca7329a6f03e777714e35d502640c61ac16849613
SHA5123477a190eda4b3fd79319ebeab24c3a62cdaffeb4d58f65488713f23e370f8a906365985dad5a8bd39a5d2e047c6f1da40af1d952cb3899c9809a32fb03b970a
-
C:\Users\Admin\AppData\Local\Temp\is-3B2TL.tmp\157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp
Filesize706KB
MD51a6c2b578c69b9388e22d38afa16a7fb
SHA1186370d5438b1f5f3d75891aa8412e8edd00981c
SHA25686ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3
SHA512fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714
-
\Users\Admin\AppData\Local\Temp\is-3B2TL.tmp\157d3a0ae88b9013acc82b5fb1bf64f0de9ebb573fadd00d67984f15fb26e53d.tmp
Filesize706KB
MD51a6c2b578c69b9388e22d38afa16a7fb
SHA1186370d5438b1f5f3d75891aa8412e8edd00981c
SHA25686ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3
SHA512fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3