Analysis
-
max time kernel
187s -
max time network
233s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 23:25
Static task
static1
Behavioral task
behavioral1
Sample
333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe
Resource
win10v2004-20220812-en
General
-
Target
333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe
-
Size
1.8MB
-
MD5
e36ee79ac5b8f3804da62864f118c934
-
SHA1
cfba959f8f33e8a383a4436a9f9c877771514f3d
-
SHA256
333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52
-
SHA512
a6885e3bbdfad819b7d322aef41a3f85315d2a1370d71640099d577524a04e091997e9e8c5221dcd41ae89f6333273bc12ea19f3cc1f674c22e1dbf992e59962
-
SSDEEP
12288:YRD7oDy0iaBuIL/R46sDuAEb8TJa8ODambaOI9qZGqR5nWFpPoSlh2AGStQ6OU8G:6DN6cjtCTaOkbV2AP2AF
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1744-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-98-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-100-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-102-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-99-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-104-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-106-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-108-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-110-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-112-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-115-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1744-117-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-119-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/1744-145-0x0000000000370000-0x00000000003AE000-memory.dmp upx -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505f5c708802d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\xui.ptlogin2.qq.com\ = "44" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\qq.com\Total = "44" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376336167" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\qq.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\qq.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D04BDD1-6E7B-11ED-87F1-C6AD45B766F5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\qq.com\NumberOfSubdomains = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\xui.ptlogin2.qq.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "44" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af000000000200000000001066000000010000200000000036b04fad5a68d8085ca65bb98487121f92b5d60a49da2754c684c740f54cfe000000000e8000000002000020000000d6d903bf5c7b8bc0c602aaed34485026ff47e75c162c9023eb4864c7bd9bae5b200000006026556c9d2f810261f22042d6dcd4df96f824a20d37384fe1f0aa52cea71df1400000005950fd273ac3f66f2addbc7727d693e392e345761bb5d851e8443d85dd64025fc76fde64d263b1f8fa03125b9bfedb418be583ca569580acfe7ef4d40c2d40d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1392 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exeiexplore.exeIEXPLORE.EXEpid process 1744 333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe 1744 333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe 1744 333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe 1744 333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe 1392 iexplore.exe 1392 iexplore.exe 1000 IEXPLORE.EXE 1000 IEXPLORE.EXE 1000 IEXPLORE.EXE 1000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exeiexplore.exedescription pid process target process PID 1744 wrote to memory of 1392 1744 333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe iexplore.exe PID 1744 wrote to memory of 1392 1744 333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe iexplore.exe PID 1744 wrote to memory of 1392 1744 333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe iexplore.exe PID 1744 wrote to memory of 1392 1744 333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe iexplore.exe PID 1392 wrote to memory of 1000 1392 iexplore.exe IEXPLORE.EXE PID 1392 wrote to memory of 1000 1392 iexplore.exe IEXPLORE.EXE PID 1392 wrote to memory of 1000 1392 iexplore.exe IEXPLORE.EXE PID 1392 wrote to memory of 1000 1392 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe"C:\Users\Admin\AppData\Local\Temp\333c230f2c8fd352bb960496e03218fa73df77a907182462b28a838009feba52.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://user.qzone.qq.com/544230987/blog/14016992892⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1000
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c50353b18365c4abc24ff5105fdb5de
SHA188563276035bd7fb444ab6abedc53c17598197b1
SHA256d5c4951cc1a06071ab5549d0071342f4e46f1c16b880b4b030bcad2e9a04bf17
SHA512b7edf2f94f967acb4715facaf418181e0811789bccd41c4c149dbc744541c0392f89edaa0c9fc83854b62b4e55ae0ce5d8e8bce31870b87554a6d0619b05c8ca
-
Filesize
5KB
MD5eddcd17fd572a916c495aa438e1d3573
SHA1e8337124c37919755d45162d22bd6b74a5836acd
SHA25680e9308ff0d807aa5ba5ea03bbc66bbc05354364cc61ccc5ebeed0663927437f
SHA5126a16dd7c9dbaeb3c4181cd2d32e3d094ebcce1782c72fc432ffa889ef0daf5a746b9ccb7a6d275b2df0e2b7b65588c91719fe947bb67217744807fed001864ac
-
Filesize
608B
MD5592fe65be352b722308f009c37acd11d
SHA10f380f268bdec322e6ab9c52329503d40598f828
SHA2560d15387ef72d1473d6465f886811de6c8ecace09ac0b17d32831cb3df7226ee6
SHA512fa3053b506d21defc087df2d9a0b0f484faa05d2c39e60b9c58ab12b05f00e3bd095acb22f8bbf9f790f1e890bb9fa6d7bb0a9a61520f037c5ef8f8e10b672ed