Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2022, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe
Resource
win10v2004-20220812-en
General
-
Target
ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe
-
Size
176KB
-
MD5
df4cbc5b1363f5c2d3a34be5ca069569
-
SHA1
0ff1c800a301a06caa4a6b52630a944653a80045
-
SHA256
ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b
-
SHA512
6332c0fc0fb70dc1b6ec405c41ff2da370c13c7d1e1dbbae687af2b61f677d56f0476ff1814f07aa56f902e5f2129cafbf5b50c81711258016dc48c9f4b2c69e
-
SSDEEP
3072:LhxvOvoq1qNvoNzlCnnfdcPlHIWOSTVNAyMMULmMng0yslB7d8w:L/Wj4uNzlefdaHicULpngulM
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2856 rundll32.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pamsm = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\pamsm.dll\",AInputStream" rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4201571041" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000244" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3913289365" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3913289365" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376795160" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1B18B052-72A8-11ED-B696-F6DE28FD18F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000244" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4192 iexplore.exe 4192 iexplore.exe 4192 iexplore.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4192 iexplore.exe 4192 iexplore.exe 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 2856 rundll32.exe 4192 iexplore.exe 4192 iexplore.exe 768 IEXPLORE.EXE 768 IEXPLORE.EXE 2856 rundll32.exe 4192 iexplore.exe 4192 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2856 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2856 4588 ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe 81 PID 4588 wrote to memory of 2856 4588 ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe 81 PID 4588 wrote to memory of 2856 4588 ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe 81 PID 4192 wrote to memory of 1052 4192 iexplore.exe 85 PID 4192 wrote to memory of 1052 4192 iexplore.exe 85 PID 4192 wrote to memory of 1052 4192 iexplore.exe 85 PID 4192 wrote to memory of 768 4192 iexplore.exe 86 PID 4192 wrote to memory of 768 4192 iexplore.exe 86 PID 4192 wrote to memory of 768 4192 iexplore.exe 86 PID 4192 wrote to memory of 2296 4192 iexplore.exe 87 PID 4192 wrote to memory of 2296 4192 iexplore.exe 87 PID 4192 wrote to memory of 2296 4192 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe"C:\Users\Admin\AppData\Local\Temp\ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\pamsm.dll",AInputStream2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:5040
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4192 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1052
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4192 CREDAT:82948 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:768
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4192 CREDAT:17414 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD54132c54f59c529167c112e7f519120fa
SHA194cc9036fa031258aa744c7ee88e3c0b6c7a73da
SHA256e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb
SHA512e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD54bd6381db690ec0704d273dbec31f211
SHA152770495e4ff68149527806ad60e1700a741f345
SHA256d002c80c1ce32f315f1ebcf855174ef9686303ff06ef2021ef03ca503af5fb63
SHA512709fd679496b3ee49e2634cad8ffc7b2d27f54372aa4cd3fcc4fe38c0e8023ea7f17d994f644c85c6fa54bfc86799b8e0f5de2fa6fd25c0a8c3095e7a28151f8
-
Filesize
176KB
MD5a4e8f0bb87ca43d0cdb15b1572df2be8
SHA14ca7e7fb0bc5b615f3359c93ce5e7c5870ed73cc
SHA256b8c61ea6f620d788ee32afb00853dfe9534d1fedbd4a1f352f736d83dd761fcd
SHA5129fdf0632b9de4fe288a8e4ab0679c9f8bc4bfc523637ba98ed1798d32120618e2379f87bfed80dedf63f1c329fa1f1ba8b31d0faeeec4678c000e7b5fbacb540
-
Filesize
176KB
MD5a4e8f0bb87ca43d0cdb15b1572df2be8
SHA14ca7e7fb0bc5b615f3359c93ce5e7c5870ed73cc
SHA256b8c61ea6f620d788ee32afb00853dfe9534d1fedbd4a1f352f736d83dd761fcd
SHA5129fdf0632b9de4fe288a8e4ab0679c9f8bc4bfc523637ba98ed1798d32120618e2379f87bfed80dedf63f1c329fa1f1ba8b31d0faeeec4678c000e7b5fbacb540
-
Filesize
176KB
MD5a4e8f0bb87ca43d0cdb15b1572df2be8
SHA14ca7e7fb0bc5b615f3359c93ce5e7c5870ed73cc
SHA256b8c61ea6f620d788ee32afb00853dfe9534d1fedbd4a1f352f736d83dd761fcd
SHA5129fdf0632b9de4fe288a8e4ab0679c9f8bc4bfc523637ba98ed1798d32120618e2379f87bfed80dedf63f1c329fa1f1ba8b31d0faeeec4678c000e7b5fbacb540
-
Filesize
176KB
MD5a4e8f0bb87ca43d0cdb15b1572df2be8
SHA14ca7e7fb0bc5b615f3359c93ce5e7c5870ed73cc
SHA256b8c61ea6f620d788ee32afb00853dfe9534d1fedbd4a1f352f736d83dd761fcd
SHA5129fdf0632b9de4fe288a8e4ab0679c9f8bc4bfc523637ba98ed1798d32120618e2379f87bfed80dedf63f1c329fa1f1ba8b31d0faeeec4678c000e7b5fbacb540