Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe
Resource
win10v2004-20220812-en
General
-
Target
971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe
-
Size
361KB
-
MD5
f3abcf3a85989a8b1961579494348044
-
SHA1
76510d1a62d9f7798626a431dadb822145044fa4
-
SHA256
971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4
-
SHA512
6fe28da92554fe2bb71c5c5e7f1055e1eb082f7142ddde4c3fe1dc94c4e372116878f49ca6b39007ec7675a05cd84f14b7df3ac713c9e41416de9dd99bde15cc
-
SSDEEP
6144:LflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:LflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 792 hvrjfbxsdzvqmfso.exe 2008 CreateProcess.exe 976 cvsolibqmj.exe 832 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 792 hvrjfbxsdzvqmfso.exe 792 hvrjfbxsdzvqmfso.exe 976 cvsolibqmj.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 708 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f1d5def204d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000869fe816581d38439fc427ad50464aad000000000200000000001066000000010000200000002ca427618bb6b141c119067a89a1d0743ac52d6c6f5201f08336bd61ffb7d3a4000000000e80000000020000200000002a7f2695959b66357bba0e27d3be63506e93975479b3a2c5b34add1fc6f88053200000006431c7919b1721817d54b5ca0f5e80edc7ad762111730ee24a615112e08bc0f240000000c95d770b50ec55e7abe6c792f8fb58bb15adc1d23ca9f3d73a72c33f9d03af48fbedd1ef9093b86f1152a3c2d88e23ce8d6f203f70b6fa753f3484cdbe139702 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000869fe816581d38439fc427ad50464aad00000000020000000000106600000001000020000000bb6755d4d5efaf0e3346e5620fe82c6000e9b57a509565d5eb464bc320376a0a000000000e800000000200002000000086be0fd4321a1a8bd8cf38b7435d6c1b9ca0236a40fa2f967b0292dd121b6b5190000000ae51347c374063dc561672c6881b952d896f3dc3a31c9b9b52e70d1fe97f11ecb107e2d150707367578a8d2517943cba707478433ad59a0f6bf73e28901f1ff21944e4ae635c83d6e5f7120597098fdad49e54ebcee4ac5f5c66a914b2f04dde1a6767b6e94a3fb56576de392a4de7c40b9a942f069b7a35e491f7c186d030dad2f24e0cba5ffdf68150c735a8ab0b9c40000000ee887699492205e88adc27a75467abc5b61ae0f5891a4456409bae1313c8b490d0ad31998b2d8fb8a0a70fda747a478df7b263774ab1605a8445762f5e8e6f25 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376601834" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F93B6391-70E5-11ED-8B2C-72E6D75F6BEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 792 hvrjfbxsdzvqmfso.exe 792 hvrjfbxsdzvqmfso.exe 792 hvrjfbxsdzvqmfso.exe 792 hvrjfbxsdzvqmfso.exe 792 hvrjfbxsdzvqmfso.exe 792 hvrjfbxsdzvqmfso.exe 792 hvrjfbxsdzvqmfso.exe 976 cvsolibqmj.exe 976 cvsolibqmj.exe 976 cvsolibqmj.exe 976 cvsolibqmj.exe 976 cvsolibqmj.exe 976 cvsolibqmj.exe 976 cvsolibqmj.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 844 iexplore.exe 844 iexplore.exe 912 IEXPLORE.EXE 912 IEXPLORE.EXE 912 IEXPLORE.EXE 912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1664 wrote to memory of 792 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 27 PID 1664 wrote to memory of 792 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 27 PID 1664 wrote to memory of 792 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 27 PID 1664 wrote to memory of 792 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 27 PID 1664 wrote to memory of 844 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 28 PID 1664 wrote to memory of 844 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 28 PID 1664 wrote to memory of 844 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 28 PID 1664 wrote to memory of 844 1664 971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe 28 PID 844 wrote to memory of 912 844 iexplore.exe 30 PID 844 wrote to memory of 912 844 iexplore.exe 30 PID 844 wrote to memory of 912 844 iexplore.exe 30 PID 844 wrote to memory of 912 844 iexplore.exe 30 PID 792 wrote to memory of 2008 792 hvrjfbxsdzvqmfso.exe 32 PID 792 wrote to memory of 2008 792 hvrjfbxsdzvqmfso.exe 32 PID 792 wrote to memory of 2008 792 hvrjfbxsdzvqmfso.exe 32 PID 792 wrote to memory of 2008 792 hvrjfbxsdzvqmfso.exe 32 PID 976 wrote to memory of 832 976 cvsolibqmj.exe 34 PID 976 wrote to memory of 832 976 cvsolibqmj.exe 34 PID 976 wrote to memory of 832 976 cvsolibqmj.exe 34 PID 976 wrote to memory of 832 976 cvsolibqmj.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe"C:\Users\Admin\AppData\Local\Temp\971b0f37d119d92036293ae3037e953fff83d914281193a2d884c520d02ddee4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Temp\hvrjfbxsdzvqmfso.exeC:\Temp\hvrjfbxsdzvqmfso.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:792 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\cvsolibqmj.exe ups_run3⤵
- Executes dropped EXE
PID:2008 -
C:\Temp\cvsolibqmj.exeC:\Temp\cvsolibqmj.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:832 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:708
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:912
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ad0a18d5497c8564cd650eccc9460a18
SHA17ac419b5dc119498bfcb7d4102b6dbedcbc88123
SHA256bede7ebc2a7a961b69953804a66aee88a3fb7d352b8f8a5e02d91e34c3571a17
SHA512f3b576f10bcecac007d48e3313038044a42e6d388ab1b1c39e9ddf99fa8907a7b0c986cfa3b69a479dbe97ebd5dff87abe4ae34ad98974d6d95b83d1c53c9b67
-
Filesize
3KB
MD5ad0a18d5497c8564cd650eccc9460a18
SHA17ac419b5dc119498bfcb7d4102b6dbedcbc88123
SHA256bede7ebc2a7a961b69953804a66aee88a3fb7d352b8f8a5e02d91e34c3571a17
SHA512f3b576f10bcecac007d48e3313038044a42e6d388ab1b1c39e9ddf99fa8907a7b0c986cfa3b69a479dbe97ebd5dff87abe4ae34ad98974d6d95b83d1c53c9b67
-
Filesize
361KB
MD57766ba5bb51741d5cf559a1046f9d9ac
SHA1ac44d1800138b9546e27def2da0ede18e31772c1
SHA25601dc3d1dc8c1126f0b9688306cf7c1dc5f81deb39150e34fd17c5b92751a38de
SHA512e6fcd181beacfb93c65088da5e3c12d902cb2830b0dd0505e69f842a6117a1e63c924b4f8cfd3cccd43d066d62b57c97a6e444d0a21eaa688035d772db3db672
-
Filesize
361KB
MD5927c3403f9e457a6d55e9f17c81ccb0a
SHA14bfd07fd7858f8a80e151471a0d64d128cac06ab
SHA256cb44265e8a1f9bba88aa3f36eda2de917ce6387673ac0132f8018cc695b71b4b
SHA512ba553ae36965651c61fc312e372f531d9609bb28aa853f8197d2b9bd678242c3ba788c227441cb6935d7b970bc848ad36d53ecba7022f0d46fa10b7b6dca7bcf
-
Filesize
361KB
MD5927c3403f9e457a6d55e9f17c81ccb0a
SHA14bfd07fd7858f8a80e151471a0d64d128cac06ab
SHA256cb44265e8a1f9bba88aa3f36eda2de917ce6387673ac0132f8018cc695b71b4b
SHA512ba553ae36965651c61fc312e372f531d9609bb28aa853f8197d2b9bd678242c3ba788c227441cb6935d7b970bc848ad36d53ecba7022f0d46fa10b7b6dca7bcf
-
Filesize
603B
MD5a04a7ce0d6a5169868137ff42c6bfedd
SHA1016c380ece5827c19c17943f3e8d4a781f615307
SHA256d6b33afced3208ba4e27471296898af63c849588510f5ab140eed0eaf09ac198
SHA51259e0c85dcdfd2cea5df4048bfa3cfa9556b4d3e8014a539a6d151e696d85f33b5296ca88d7477b50d35843cdf2fbdde15031a52895e30d4f5205361b54ac685c
-
Filesize
3KB
MD5ad0a18d5497c8564cd650eccc9460a18
SHA17ac419b5dc119498bfcb7d4102b6dbedcbc88123
SHA256bede7ebc2a7a961b69953804a66aee88a3fb7d352b8f8a5e02d91e34c3571a17
SHA512f3b576f10bcecac007d48e3313038044a42e6d388ab1b1c39e9ddf99fa8907a7b0c986cfa3b69a479dbe97ebd5dff87abe4ae34ad98974d6d95b83d1c53c9b67
-
Filesize
3KB
MD5ad0a18d5497c8564cd650eccc9460a18
SHA17ac419b5dc119498bfcb7d4102b6dbedcbc88123
SHA256bede7ebc2a7a961b69953804a66aee88a3fb7d352b8f8a5e02d91e34c3571a17
SHA512f3b576f10bcecac007d48e3313038044a42e6d388ab1b1c39e9ddf99fa8907a7b0c986cfa3b69a479dbe97ebd5dff87abe4ae34ad98974d6d95b83d1c53c9b67
-
Filesize
3KB
MD5ad0a18d5497c8564cd650eccc9460a18
SHA17ac419b5dc119498bfcb7d4102b6dbedcbc88123
SHA256bede7ebc2a7a961b69953804a66aee88a3fb7d352b8f8a5e02d91e34c3571a17
SHA512f3b576f10bcecac007d48e3313038044a42e6d388ab1b1c39e9ddf99fa8907a7b0c986cfa3b69a479dbe97ebd5dff87abe4ae34ad98974d6d95b83d1c53c9b67
-
Filesize
3KB
MD5ad0a18d5497c8564cd650eccc9460a18
SHA17ac419b5dc119498bfcb7d4102b6dbedcbc88123
SHA256bede7ebc2a7a961b69953804a66aee88a3fb7d352b8f8a5e02d91e34c3571a17
SHA512f3b576f10bcecac007d48e3313038044a42e6d388ab1b1c39e9ddf99fa8907a7b0c986cfa3b69a479dbe97ebd5dff87abe4ae34ad98974d6d95b83d1c53c9b67
-
Filesize
361KB
MD5927c3403f9e457a6d55e9f17c81ccb0a
SHA14bfd07fd7858f8a80e151471a0d64d128cac06ab
SHA256cb44265e8a1f9bba88aa3f36eda2de917ce6387673ac0132f8018cc695b71b4b
SHA512ba553ae36965651c61fc312e372f531d9609bb28aa853f8197d2b9bd678242c3ba788c227441cb6935d7b970bc848ad36d53ecba7022f0d46fa10b7b6dca7bcf