Analysis
-
max time kernel
190s -
max time network
220s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 14:59
Static task
static1
Behavioral task
behavioral1
Sample
97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe
Resource
win10v2004-20221111-en
General
-
Target
97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe
-
Size
2.6MB
-
MD5
9886a02c9ce1b37d9ce0fb755ad72338
-
SHA1
21a8fe61b217c2d105c9db4e81029f284ab313d4
-
SHA256
97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26
-
SHA512
bb4d4c83a1ab4bd18209772ce8a112f02324e7f141a3dd9f526f45bbe8b5652a6c76540b73bda9d63c52c4ea5a30ee40a22d1c5cfa89a81d0f4d957f310e5bcf
-
SSDEEP
49152:qjW22u50BUAZPFZfJcoexwEBYX10xmaoadtwuXrG:G12c+USF0oowEBM10gaoatwuXrG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1340-55-0x0000000002890000-0x00000000028CD000-memory.dmp upx behavioral1/memory/1340-56-0x0000000002890000-0x00000000028C5000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E91C03B1-7113-11ED-BF99-4ED4A804E0FC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\luokexf.com\Total = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\qq.com\NumberOfSubdomains = "1" 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004e22df2005d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\luokexf.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.luokexf.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\qq.com 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\luokexf.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.luokexf.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af000000000200000000001066000000010000200000008fa25ff7e3c15705b05c0904fe088f4e930b5cdcbb92bf37e1c41f34f84ca31e000000000e800000000200002000000082d33a82baeec70edb85c3a348dc7fcb22df640ea93bcd79ae5f9a4804ffcd21200000006af5db71e4965a507a26131cec531ff8220e8fd7bf0b368101404913c362f3464000000064c788265c35032bfbf5079aa3e363a908a1a3fbe53beb259a767520410fcce263d3bd2bd11420fc85869bbde88d9c2c3979bd4b23f917efbc7764c64823c2f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376621559" iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 984 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1340 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe 1340 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe 1340 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe 1340 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe 1340 97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe 984 iexplore.exe 984 iexplore.exe 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 984 wrote to memory of 1656 984 iexplore.exe 31 PID 984 wrote to memory of 1656 984 iexplore.exe 31 PID 984 wrote to memory of 1656 984 iexplore.exe 31 PID 984 wrote to memory of 1656 984 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe"C:\Users\Admin\AppData\Local\Temp\97ee15b07efe8df959b1aec9b5eee2cbd68755c43d0a803e32d736f0b2892e26.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:1340
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d7fa75e23e18f5b28605e434ac8acd8
SHA1276a3ac2038ce3979ad8750516f1cc71b48dfe94
SHA256715804f07600489f96beb329afeeb512bf56f100e109ca9e45566c62ee407cd2
SHA512a6e4e6fe6cdd0f34828532c2205bd371e8cc57f139d7125b1edb09adb68edba9761f2518f2417d408ee3796fa13a58eac1f4bbaea0eb44e677423b17d5ab9672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a7e706842a1e32a7f1fff577f57e225
SHA114a30db464a88baf0a5e99334a760137aedb112e
SHA256b803f6e85a3807d0ceb3694c98a59829c5cce2709dd758ed9673113f803b5e9e
SHA5127160133fac31b7c886c6130a01b93138dc55233a5bd1d491096ec45adda70f1b8d7c072adc77ac2549f7b4380ffd7d58a2e511d18220dde5028ab09741a394da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53300dff579b2908eb6d07ce82ae77871
SHA1b6042995795f1203933d0fe27fd13d9d0bc9a2ab
SHA2561ea4f2d66a5f6b52cc32c6f7a200dd55790424b430c71fa26be4bfbd30a5bc83
SHA51288fd597e7bc6431279edb408b538a72b36766c7ca2016584dfa60aadab9ab687c422aac4165351549daff641f82b15a1a85eb4fc1439f02b73e7638e9b054188
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X8FNYYS1\h[1].js
Filesize29KB
MD5a8d299147378f8132fc6df51ea86f0d2
SHA127a003d345f586cb8b2ca9af06a862fd79ac8a66
SHA256325fbcb3b379730822fd41bb4704259dfdd4062c5446cb47439c385be4e80c23
SHA512f0af6ffe2c054fa460fa9ea03a01cb0d5339f6158731cfbfce0e120aaceb1797c3bb223f3a2abcab6f2d0ccbd39dced294125e0c14ef4f92113fbc5fd4d99ca0
-
Filesize
533B
MD5e5c18392a045bdb7587a7492ff61cf80
SHA1aa149c0ae42c4d71be87b6b373d8a72693742e6f
SHA256826520e68bc017a24f9d4fb02ebb1f3165040c6eba0f1aeb896201b7ac24bbac
SHA5121ba54923e17341c94d4804f1dc5297aa149e474163382cb38fe19f246dfea6cd00a5023f4287b03eb17f2d58c3db22043727c61c644db4e654fc8330789efcc5
-
Filesize
94B
MD5c155ac31e3b6e2101caff088b7715c3b
SHA1e2badf5900c6dee9011f552957ff2f90b976bf10
SHA256d22844fc8ab09a41022367ee835b9f695139e8a00a1df1722fd165957254e5a8
SHA5121a059e55661a043e6d474c52ebceee95bc685160bd0f722f4ccede039cc312b1b6863927d9b052df9e62f3a9f91171709a6c888d3981ce90db24e8903bee2510