Analysis
-
max time kernel
32s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:13
Static task
static1
Behavioral task
behavioral1
Sample
2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe
Resource
win10v2004-20220901-en
General
-
Target
2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe
-
Size
76KB
-
MD5
272870fedad583cf538f97a115f5a658
-
SHA1
1aad162d8b845a0b7b236038d2f40af08c8ae306
-
SHA256
2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c
-
SHA512
ed50b585601edc6b4ac37e2d033395c072b1ae67025ab6922eda81c64b7bd302d1e8d372cc5e33ef56e955556e5aea56574d1ff1e48753b2231686c4712fd9a5
-
SSDEEP
1536:Bo+PkB4ENPUwhweme0Dcuj6I9KRoxtxrUMVPeWq0pxIojLtiS9e:Bo+Pk+ePU4w9eScuj6I9pfxtVPeSIoNO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1900 iexplore 2020 iexplore -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\iexplore" 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\iexplore" userinit.exe -
Deletes itself 1 IoCs
pid Process 972 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 1896 userinit.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 1896 1900 iexplore 28 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\iexplore 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe File created C:\Program Files\iexplore 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe File opened for modification C:\Program Files\iexplore userinit.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 552 wrote to memory of 1900 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 27 PID 552 wrote to memory of 1900 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 27 PID 552 wrote to memory of 1900 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 27 PID 552 wrote to memory of 1900 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 27 PID 552 wrote to memory of 1900 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 27 PID 552 wrote to memory of 1900 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 27 PID 552 wrote to memory of 1900 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 27 PID 1900 wrote to memory of 1896 1900 iexplore 28 PID 1900 wrote to memory of 1896 1900 iexplore 28 PID 1900 wrote to memory of 1896 1900 iexplore 28 PID 1900 wrote to memory of 1896 1900 iexplore 28 PID 1900 wrote to memory of 1896 1900 iexplore 28 PID 1900 wrote to memory of 1896 1900 iexplore 28 PID 1900 wrote to memory of 1896 1900 iexplore 28 PID 1900 wrote to memory of 1896 1900 iexplore 28 PID 1900 wrote to memory of 1896 1900 iexplore 28 PID 552 wrote to memory of 972 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 29 PID 552 wrote to memory of 972 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 29 PID 552 wrote to memory of 972 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 29 PID 552 wrote to memory of 972 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 29 PID 552 wrote to memory of 972 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 29 PID 552 wrote to memory of 972 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 29 PID 552 wrote to memory of 972 552 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 29 PID 1896 wrote to memory of 2020 1896 userinit.exe 31 PID 1896 wrote to memory of 2020 1896 userinit.exe 31 PID 1896 wrote to memory of 2020 1896 userinit.exe 31 PID 1896 wrote to memory of 2020 1896 userinit.exe 31 PID 1896 wrote to memory of 2020 1896 userinit.exe 31 PID 1896 wrote to memory of 2020 1896 userinit.exe 31 PID 1896 wrote to memory of 2020 1896 userinit.exe 31 PID 2020 wrote to memory of 1968 2020 iexplore 32 PID 2020 wrote to memory of 1968 2020 iexplore 32 PID 2020 wrote to memory of 1968 2020 iexplore 32 PID 2020 wrote to memory of 1968 2020 iexplore 32 PID 1896 wrote to memory of 108 1896 userinit.exe 34 PID 1896 wrote to memory of 108 1896 userinit.exe 34 PID 1896 wrote to memory of 108 1896 userinit.exe 34 PID 1896 wrote to memory of 108 1896 userinit.exe 34 PID 1896 wrote to memory of 108 1896 userinit.exe 34 PID 1896 wrote to memory of 108 1896 userinit.exe 34 PID 1896 wrote to memory of 108 1896 userinit.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe"C:\Users\Admin\AppData\Local\Temp\2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files\iexplore"C:\Program Files\iexplore"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\userinit.exeC:\Windows\SYSTEM32\userinit.exe3⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files\iexplore"C:\Program Files\iexplore"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE5⤵PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Windows\SysWOW64\userinit.exe"4⤵PID:108
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe"2⤵
- Deletes itself
PID:972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5272870fedad583cf538f97a115f5a658
SHA11aad162d8b845a0b7b236038d2f40af08c8ae306
SHA2562143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c
SHA512ed50b585601edc6b4ac37e2d033395c072b1ae67025ab6922eda81c64b7bd302d1e8d372cc5e33ef56e955556e5aea56574d1ff1e48753b2231686c4712fd9a5
-
Filesize
76KB
MD5272870fedad583cf538f97a115f5a658
SHA11aad162d8b845a0b7b236038d2f40af08c8ae306
SHA2562143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c
SHA512ed50b585601edc6b4ac37e2d033395c072b1ae67025ab6922eda81c64b7bd302d1e8d372cc5e33ef56e955556e5aea56574d1ff1e48753b2231686c4712fd9a5
-
Filesize
26KB
MD561ac3efdfacfdd3f0f11dd4fd4044223
SHA1211295ccda6cf6409189279bf66a212bd53fc650
SHA256538fe1012fedc72727a8de0c2c01944b3d35c29812ecef88e95aac07235e0b0b
SHA512754aefaa81b2435e05037c0a7d057fd86ef8f62d49aad399d7fc4ead1e68793e5cc9ba639245a133cfb6f67d1f4bb6a95a972da3ef4ed92855cb1742241f89eb
-
Filesize
26KB
MD561ac3efdfacfdd3f0f11dd4fd4044223
SHA1211295ccda6cf6409189279bf66a212bd53fc650
SHA256538fe1012fedc72727a8de0c2c01944b3d35c29812ecef88e95aac07235e0b0b
SHA512754aefaa81b2435e05037c0a7d057fd86ef8f62d49aad399d7fc4ead1e68793e5cc9ba639245a133cfb6f67d1f4bb6a95a972da3ef4ed92855cb1742241f89eb
-
Filesize
76KB
MD5272870fedad583cf538f97a115f5a658
SHA11aad162d8b845a0b7b236038d2f40af08c8ae306
SHA2562143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c
SHA512ed50b585601edc6b4ac37e2d033395c072b1ae67025ab6922eda81c64b7bd302d1e8d372cc5e33ef56e955556e5aea56574d1ff1e48753b2231686c4712fd9a5
-
Filesize
26KB
MD561ac3efdfacfdd3f0f11dd4fd4044223
SHA1211295ccda6cf6409189279bf66a212bd53fc650
SHA256538fe1012fedc72727a8de0c2c01944b3d35c29812ecef88e95aac07235e0b0b
SHA512754aefaa81b2435e05037c0a7d057fd86ef8f62d49aad399d7fc4ead1e68793e5cc9ba639245a133cfb6f67d1f4bb6a95a972da3ef4ed92855cb1742241f89eb