Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 11:13
Static task
static1
Behavioral task
behavioral1
Sample
ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe
Resource
win10v2004-20221111-en
General
-
Target
ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe
-
Size
361KB
-
MD5
2073aad9b6842840eeb1e9fc5a3790ed
-
SHA1
51a0af5f7ee71a82f92020cb0ec1fee221159281
-
SHA256
ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda
-
SHA512
762357992fde1e904cc384dbcac01c8a185a8d38f8b99a05e950e5256e059bf87e4acf269f87fdae1357cd2ec257e99ee6862ffcc3e119baecd5892e448845e6
-
SSDEEP
6144:FflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:FflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1292 rqojidusomlgxsrp.exe 1984 CreateProcess.exe 1120 xuqqeaxttp.exe 828 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1292 rqojidusomlgxsrp.exe 1292 rqojidusomlgxsrp.exe 1120 xuqqeaxttp.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1624 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ca40fd66a5c7c84693a7e8e1c4c8d83d000000000200000000001066000000010000200000009b9842070a0d1e088d53f3bc4c8cb6c2efc4b45560cff289e1fd7f104a28232d000000000e8000000002000020000000a9b2eebf65a04221610acef1aa5618dcae44675317c4b835daae794097e5ba232000000001f97e264f76c31bdd1c48a4a3b99b809bd6d6549cfcd7eac5e76bb5a8d307144000000072d67168605d7b7116eb3ff7dd18d96465776786333082a195721d12ebf26232a613952576af48228eb10e95105903eb13e3262d2ee30ae70f9af0f1e0203b9b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6113FEB1-70D6-11ED-B2F2-7E6ADD856DC1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70584c41e304d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ca40fd66a5c7c84693a7e8e1c4c8d83d0000000002000000000010660000000100002000000002d43fd3672a30e6b37c9cc72e749aa0da072e66f28a4413c5c1cfa76101e5ab000000000e80000000020000200000003c63aebe4bbc358f7a1e561e7843ee11c6995f2e0f269aea8786732c2e2d091690000000197c4102336e5321c96077a64864c376fc4888dca19792854889ef4da0676c7c0ad3951637b1c08848e41a64be3dccfadf966a027d3d4f14b640cc43808eca32507b0ec5e973879813b7c4af15c5ecd969a63c81cef21748ce441d23cbc08880c5282c18a68466376901bf40ec7bce6f10d59b68aeb829cf416000f59732411ddf300fceb0017f5422e9dca519b348d440000000fac082d03a3348032c77431e324a77f4ef6768a5a93d5ff08ca9e5a721ffddc076b2639e783a8559c8e3a2356d8476bd9e5dd35ad5f89392b767887057557656 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376595133" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 1292 rqojidusomlgxsrp.exe 1292 rqojidusomlgxsrp.exe 1292 rqojidusomlgxsrp.exe 1292 rqojidusomlgxsrp.exe 1292 rqojidusomlgxsrp.exe 1292 rqojidusomlgxsrp.exe 1292 rqojidusomlgxsrp.exe 1120 xuqqeaxttp.exe 1120 xuqqeaxttp.exe 1120 xuqqeaxttp.exe 1120 xuqqeaxttp.exe 1120 xuqqeaxttp.exe 1120 xuqqeaxttp.exe 1120 xuqqeaxttp.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1912 iexplore.exe 1912 iexplore.exe 520 IEXPLORE.EXE 520 IEXPLORE.EXE 520 IEXPLORE.EXE 520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1292 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 27 PID 1060 wrote to memory of 1292 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 27 PID 1060 wrote to memory of 1292 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 27 PID 1060 wrote to memory of 1292 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 27 PID 1060 wrote to memory of 1912 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 28 PID 1060 wrote to memory of 1912 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 28 PID 1060 wrote to memory of 1912 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 28 PID 1060 wrote to memory of 1912 1060 ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe 28 PID 1912 wrote to memory of 520 1912 iexplore.exe 30 PID 1912 wrote to memory of 520 1912 iexplore.exe 30 PID 1912 wrote to memory of 520 1912 iexplore.exe 30 PID 1912 wrote to memory of 520 1912 iexplore.exe 30 PID 1292 wrote to memory of 1984 1292 rqojidusomlgxsrp.exe 32 PID 1292 wrote to memory of 1984 1292 rqojidusomlgxsrp.exe 32 PID 1292 wrote to memory of 1984 1292 rqojidusomlgxsrp.exe 32 PID 1292 wrote to memory of 1984 1292 rqojidusomlgxsrp.exe 32 PID 1120 wrote to memory of 828 1120 xuqqeaxttp.exe 34 PID 1120 wrote to memory of 828 1120 xuqqeaxttp.exe 34 PID 1120 wrote to memory of 828 1120 xuqqeaxttp.exe 34 PID 1120 wrote to memory of 828 1120 xuqqeaxttp.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe"C:\Users\Admin\AppData\Local\Temp\ca09090772201fbfb8253ea6220394935206e9330782feecff757bb583683bda.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Temp\rqojidusomlgxsrp.exeC:\Temp\rqojidusomlgxsrp.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\xuqqeaxttp.exe ups_run3⤵
- Executes dropped EXE
PID:1984 -
C:\Temp\xuqqeaxttp.exeC:\Temp\xuqqeaxttp.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:828 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1624
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:520
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52815f995567c0108d6be1c3d9a074b54
SHA1eb1f4ab8fc7bbda5db79804bd3590b59ecd91402
SHA256c4d0c7064e21d40151f6e237c96c1393ccdadc4312c132495678739fa00fefc0
SHA51240611256face4fd20215644b93f414ca1a147b02f522b07ccf907b7ed3862b0d9d5c51a5143cdd739bd4cb0352760d9a4ad6eb0d5bf91680c25f649da2f1ff86
-
Filesize
3KB
MD52815f995567c0108d6be1c3d9a074b54
SHA1eb1f4ab8fc7bbda5db79804bd3590b59ecd91402
SHA256c4d0c7064e21d40151f6e237c96c1393ccdadc4312c132495678739fa00fefc0
SHA51240611256face4fd20215644b93f414ca1a147b02f522b07ccf907b7ed3862b0d9d5c51a5143cdd739bd4cb0352760d9a4ad6eb0d5bf91680c25f649da2f1ff86
-
Filesize
361KB
MD570ef4a9d09feb667d9777bc68a1fdccf
SHA18ca83bdfce6e351b8fb4ebc3aa40e4f23e7ad58b
SHA256bb1fec57aba5a8279f567882d10e0997836eac01e581ebdcf870507c0eaae792
SHA51237e7a533f8da4543dd2fc07c7db110611f0d07adadb782d28bee59de4fc7724aa81fbbf75a649d3f98712afc046d8fc040883553518a77eea3a49d93de8e9ffe
-
Filesize
361KB
MD570ef4a9d09feb667d9777bc68a1fdccf
SHA18ca83bdfce6e351b8fb4ebc3aa40e4f23e7ad58b
SHA256bb1fec57aba5a8279f567882d10e0997836eac01e581ebdcf870507c0eaae792
SHA51237e7a533f8da4543dd2fc07c7db110611f0d07adadb782d28bee59de4fc7724aa81fbbf75a649d3f98712afc046d8fc040883553518a77eea3a49d93de8e9ffe
-
Filesize
361KB
MD5f9dd504940d7b5e3ef8828fb3c024a54
SHA18a95985926dd2fd52b99740c749e5e52be6501c3
SHA256a332c53432626261b4b46a1096596aff6ed1feced849b427ac9643b4653f022b
SHA512316259f34033904d251f20d13c14da3b10991e93780922ccb9783cc27cc17ccc0597812ba8f900167a1d24877e7ecb81dfcd663f813e0c9bcd942a67a36df966
-
Filesize
539B
MD5ab0d904834c5fb7dbd5c3d29a0eb1fc3
SHA1efb39dbf06c7643b1a90861c845cf1ac9e0e2625
SHA2563b500c117af5e2689ccc754509bbfe5a429ab2d930f687fd9f025c7c59d9e7ad
SHA51226abc34922b4c1a83c162ae75b29ee121ecc1608a575f9047402987be0375fd5b1261242d04e70f3a0aeba31a25ae2493714289f8a2739b684af66076bd64572
-
Filesize
3KB
MD52815f995567c0108d6be1c3d9a074b54
SHA1eb1f4ab8fc7bbda5db79804bd3590b59ecd91402
SHA256c4d0c7064e21d40151f6e237c96c1393ccdadc4312c132495678739fa00fefc0
SHA51240611256face4fd20215644b93f414ca1a147b02f522b07ccf907b7ed3862b0d9d5c51a5143cdd739bd4cb0352760d9a4ad6eb0d5bf91680c25f649da2f1ff86
-
Filesize
3KB
MD52815f995567c0108d6be1c3d9a074b54
SHA1eb1f4ab8fc7bbda5db79804bd3590b59ecd91402
SHA256c4d0c7064e21d40151f6e237c96c1393ccdadc4312c132495678739fa00fefc0
SHA51240611256face4fd20215644b93f414ca1a147b02f522b07ccf907b7ed3862b0d9d5c51a5143cdd739bd4cb0352760d9a4ad6eb0d5bf91680c25f649da2f1ff86
-
Filesize
3KB
MD52815f995567c0108d6be1c3d9a074b54
SHA1eb1f4ab8fc7bbda5db79804bd3590b59ecd91402
SHA256c4d0c7064e21d40151f6e237c96c1393ccdadc4312c132495678739fa00fefc0
SHA51240611256face4fd20215644b93f414ca1a147b02f522b07ccf907b7ed3862b0d9d5c51a5143cdd739bd4cb0352760d9a4ad6eb0d5bf91680c25f649da2f1ff86
-
Filesize
3KB
MD52815f995567c0108d6be1c3d9a074b54
SHA1eb1f4ab8fc7bbda5db79804bd3590b59ecd91402
SHA256c4d0c7064e21d40151f6e237c96c1393ccdadc4312c132495678739fa00fefc0
SHA51240611256face4fd20215644b93f414ca1a147b02f522b07ccf907b7ed3862b0d9d5c51a5143cdd739bd4cb0352760d9a4ad6eb0d5bf91680c25f649da2f1ff86
-
Filesize
361KB
MD570ef4a9d09feb667d9777bc68a1fdccf
SHA18ca83bdfce6e351b8fb4ebc3aa40e4f23e7ad58b
SHA256bb1fec57aba5a8279f567882d10e0997836eac01e581ebdcf870507c0eaae792
SHA51237e7a533f8da4543dd2fc07c7db110611f0d07adadb782d28bee59de4fc7724aa81fbbf75a649d3f98712afc046d8fc040883553518a77eea3a49d93de8e9ffe