Analysis
-
max time kernel
136s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe
Resource
win10v2004-20220812-en
General
-
Target
8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe
-
Size
168KB
-
MD5
614dfc5635f3515b6b8c63b2928f98e0
-
SHA1
fabc50160503331844442f655fd3b73d18cc098d
-
SHA256
8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0
-
SHA512
2ed82946b950899c59d3e07f089069c57e1f37e5673aa80f949e3d570231c51926908b59c15acf6e49f07d9b0d1f4d29c8887623a6b6939459e2dc80b8907ae0
-
SSDEEP
1536:HW26WFbKrDU9DTWYvOfw/5+9LbIcvxLg3c3XlSPolNgZfAXgVH/QtM0BWr0pkd:PTW6LcLbIVclSrfAwfQtMJr0pkd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "36" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e014b55fa804d901 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cde601fe598a8b4ab7985a6c994d54f000000000020000000000106600000001000020000000ff3a1b88be216e69f387b399b138c4619e17571a737184413f1639a29c597264000000000e80000000020000200000002c615c847d7599bb1b5edb282f52a27371fd23aea590c70d0b70b71d2f579ebb90000000200fdf7ec083636c9307ee5d90b983a96ed2a91a48df19962fd808e4763b7c9cca19467bcd4814a7ff0f1b80d46e275b0f5c6c09dc09fba8979944624756ac1713f4a3902f8c3e30d3d8e9cb5ef4e3463abf4716b193de56ef20b85d80979935b93fb51dd3bcfea9676f5fb86d5a2cbd3228cdfa3b237673cbd3ca269881847a1715179dd66440da6dec73b0e7b32fc1400000003b905d744dec4f071424edc3c2e86aaa1833920f4b0014ea161898a2f4ab8770b1b752a8c5ca716b734a5cc78bd3895923ced337d113f1c6d2fa247e7f55fa81 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "64" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "358" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "358" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "22" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "390" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "64" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "390" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "36" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "358" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "22" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "64" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376569845" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cde601fe598a8b4ab7985a6c994d54f000000000020000000000106600000001000020000000df26adde7690c013a9214c998fb2f7a61d6352a6537af427b7d447153464d28b000000000e8000000002000020000000aa04a028b51b8e6b4411a8ad3e46963f280ff046fb4883f81b47bf6ba2cb33c82000000008801bc38e8632e645791bab3bc7a88a08befa0f01dfe6b47d1ad5045ba118b740000000e5cafe387584faf94270a052e195d42768c388e6b6274cd5ea1c2e47f5a7142535ffe924aa11f2daa15833d140f5c95a95b57bf1cc383846f7e9b662fd5934aa IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CB507D1-709B-11ED-AA01-6AB3F8C7EA51} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "36" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "390" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "22" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 280 IEXPLORE.EXE 280 IEXPLORE.EXE 280 IEXPLORE.EXE 280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1644 wrote to memory of 992 1644 8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe 28 PID 1644 wrote to memory of 992 1644 8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe 28 PID 1644 wrote to memory of 992 1644 8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe 28 PID 1644 wrote to memory of 992 1644 8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe 28 PID 992 wrote to memory of 428 992 8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe 29 PID 992 wrote to memory of 428 992 8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe 29 PID 992 wrote to memory of 428 992 8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe 29 PID 992 wrote to memory of 428 992 8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe 29 PID 428 wrote to memory of 2020 428 iexplore.exe 30 PID 428 wrote to memory of 2020 428 iexplore.exe 30 PID 428 wrote to memory of 2020 428 iexplore.exe 30 PID 428 wrote to memory of 2020 428 iexplore.exe 30 PID 2020 wrote to memory of 280 2020 IEXPLORE.EXE 32 PID 2020 wrote to memory of 280 2020 IEXPLORE.EXE 32 PID 2020 wrote to memory of 280 2020 IEXPLORE.EXE 32 PID 2020 wrote to memory of 280 2020 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe"C:\Users\Admin\AppData\Local\Temp\8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exeC:\Users\Admin\AppData\Local\Temp\8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe -rc2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\program files (x86)\Internet Explorer\iexplore.exe"C:\program files (x86)\Internet Explorer\iexplore.exe" ya.ru3⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" ya.ru4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:280
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5e54585295a5864a2a73a862504cc5cdd
SHA108b09a89a92407dbacc0e00f9a08518dec842dec
SHA256bd4adb903c574abed8dae3e2a8dd2b0d0081abd3365ea281aabaf4fd921fc2e4
SHA512978ed4cb1f761b2402cb44ee167e9e4dd7a87c40c160c1d7cb39ef94f46da2e42fc5250f9bf68956fe878a84cb4b5afb7bc2d98bd4e56a102caf3b26b09539e9
-
Filesize
5KB
MD5479c1388799d4bda2cbce5ff8730fcd0
SHA1ba3659e0f1a9ce7650612ca59da7c8fa872b95d5
SHA256ce131f69ff945c2c7a63d40d17409db72c8b87411a6c083c35a8a8867a0d8892
SHA51224c9d27e1485ebbbfd52973caa2ebfb015071ec8b0212ab3e3aa0dda060a7c0ad09b58257a0afb9fb433fbbe44c7cc787331129a29c7c9e4b1d55fa03b21fc31
-
Filesize
608B
MD533ddae970f5d5b98af1013a865bd6fc3
SHA10d47cd599ab81fbc21dca21735973a3ea81c328c
SHA2560234e1fc8d4f4129b856701629fcf678ff7c952f786a8f1e702974b8715ed686
SHA512003478ae44bc9f1bd3a699e1114bb26ee8c6f63cae61443cb76c9d9729fd5be9c25e21eba075e8b7af66c7a78e4704322ed8f8480f69dc3639843e27f65d0431