Analysis
-
max time kernel
168s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 07:07
Static task
static1
Behavioral task
behavioral1
Sample
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe
Resource
win7-20221111-en
General
-
Target
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe
-
Size
3.8MB
-
MD5
57c10b764a04c7becd89b8159f5fa88a
-
SHA1
84cfd16944399f66550ab8f7e958146903e455ef
-
SHA256
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6
-
SHA512
abee86b8b4d83bbbaa953caba2f8bd556ba4c41748079623cd4933c9662589d62244b80872234c04b4e6745b4bb77a0e9638fbc001eeaee0341050ed82ff1915
-
SSDEEP
98304:eBVZB/g2p6FYskEhipqdwkLQHHhsSYt8d7+94qoa+N0:Q36+skCfsKSOo+93H
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SkinH_EL.dll acprotect -
Disables RegEdit via registry modification 2 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "0" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SkinH_EL.dll upx behavioral1/memory/1512-66-0x0000000000820000-0x000000000085D000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/1512-57-0x0000000002BC0000-0x0000000002D8D000-memory.dmp vmprotect behavioral1/memory/1512-59-0x0000000002BC0000-0x0000000002D8D000-memory.dmp vmprotect -
Loads dropped DLL 2 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exepid process 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Drops file in System32 directory 2 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exedescription ioc process File created C:\Windows\SysWOW64\svchost.exe 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe File opened for modification C:\Windows\SysWOW64\svchost.exe 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exepid process 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/?28879" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/?kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Modifies Internet Explorer start page 1 TTPs 4 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?28879" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exedescription ioc process Key created \REGISTRY\USER\Software\Microsoft\Internet Explorer\Main 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\Software 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\SOFTWARE 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\Software\Policies\Microsoft\Internet Explorer\Main 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Modifies registry class 32 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S-1-5-21-1202660629-2147037411-854245398-500\CLSID 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\S-1-5-21-1202660629-2147037411-854245398-500\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\"http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\Search Bar = "http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S-1-5-21-1202660629-2147037411-854245398-500\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Classes 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Policies\Microsoft 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Policies\Microsoft\Internet Explorer\Main 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S-1-5-21-1202660629-2147037411-854245398-500\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Software\Microsoft\Internet Explorer\Main 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Software\Policies\Microsoft\Internet Explorer\Main 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Software 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command = "C:\\Program Files\\Internet Explorer\\iexplore.exe %1 http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command = "C:\\Program Files\\Internet Explorer\\iexplore.exe %1 http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Policies 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S-1-5-21-1202660629-2147037411-854245398-500\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Policies\Microsoft\Internet Explorer 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/kfi1997" 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S-1-5-21-1202660629-2147037411-854245398-500 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Classes\CLSID 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exepid process 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exepid process 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exedescription pid process target process PID 1512 wrote to memory of 524 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe svchost.exe PID 1512 wrote to memory of 524 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe svchost.exe PID 1512 wrote to memory of 524 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe svchost.exe PID 1512 wrote to memory of 524 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe svchost.exe PID 1512 wrote to memory of 880 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe svchost.exe PID 1512 wrote to memory of 880 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe svchost.exe PID 1512 wrote to memory of 880 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe svchost.exe PID 1512 wrote to memory of 880 1512 4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe"C:\Users\Admin\AppData\Local\Temp\4536efcc9382cd4498470c36f16267882d4173e58dfa4cfee880e198e7d8d8c6.exe"1⤵
- Disables RegEdit via registry modification
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\SkinH_EL.dllFilesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d
-
\Users\Admin\AppData\Local\Temp\lazycommon.dllFilesize
676KB
MD5033d1db88147b6dab9a1795027a87e74
SHA1f6e9f5e82af3e9546711d42aab705a494e851d44
SHA256a85b830cec14449763cc174d600324372798f2bb8c5276546419cc6b2563db1c
SHA5127689fc5812fc89e27f5691259c15e4109b3ecfd1933393e1d9ce2d63acc37149aa4cf6124c353b62b39352162e9509d7b49caeaabc1618c8e495a14cef095e33
-
memory/524-67-0x0000000000000000-mapping.dmp
-
memory/880-69-0x0000000000000000-mapping.dmp
-
memory/1512-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmpFilesize
8KB
-
memory/1512-56-0x0000000010000000-0x00000000100AA000-memory.dmpFilesize
680KB
-
memory/1512-57-0x0000000002BC0000-0x0000000002D8D000-memory.dmpFilesize
1.8MB
-
memory/1512-59-0x0000000002BC0000-0x0000000002D8D000-memory.dmpFilesize
1.8MB
-
memory/1512-64-0x0000000010000000-0x00000000100AA000-memory.dmpFilesize
680KB
-
memory/1512-65-0x0000000002BC0000-0x0000000002D8D000-memory.dmpFilesize
1.8MB
-
memory/1512-66-0x0000000000820000-0x000000000085D000-memory.dmpFilesize
244KB
-
memory/1512-68-0x0000000002BC0000-0x0000000002D8D000-memory.dmpFilesize
1.8MB