Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 00:30
Static task
static1
Behavioral task
behavioral1
Sample
9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe
Resource
win10v2004-20220901-en
General
-
Target
9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe
-
Size
144KB
-
MD5
21a6758e4971d6ae338c5ef05c5fca42
-
SHA1
a037b220d8a1de3907916eb7ac6bfa7edf40dfed
-
SHA256
9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c
-
SHA512
be36593e0b1669d8e71a381cc0f59bf82e2be3251118815a825fc2aafa4e36b31bd9e4e6414971f46295bb177bb68f2ef0f64eab3fec446ac3db074917968ade
-
SSDEEP
3072:8R8CTNOgBw//psO5O1IX6gET/JTG4HZbjnCL6dgfNJZMqGmwmwmR:gNBw//psO5mIX6gETtGupn1gffZMqGma
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4760 rundll32.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wituv = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\wituv.dll\",GetSystemParameter" rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{480F3F5E-72AA-11ED-A0EE-C243EF799EB6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000247" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000247" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "480333634" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "719085707" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "641273118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff720000001a000000f80400007f020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "484870453" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376796095" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000247" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "480333634" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000247" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000247" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3828 iexplore.exe 3828 iexplore.exe 3828 iexplore.exe 3828 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 3828 iexplore.exe 3828 iexplore.exe 4188 IEXPLORE.EXE 4188 IEXPLORE.EXE 4760 rundll32.exe 3828 iexplore.exe 3828 iexplore.exe 240 IEXPLORE.EXE 240 IEXPLORE.EXE 4760 rundll32.exe 3828 iexplore.exe 3828 iexplore.exe 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE 4760 rundll32.exe 3828 iexplore.exe 3828 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 4760 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4760 4864 9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe 81 PID 4864 wrote to memory of 4760 4864 9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe 81 PID 4864 wrote to memory of 4760 4864 9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe 81 PID 3828 wrote to memory of 4188 3828 iexplore.exe 84 PID 3828 wrote to memory of 4188 3828 iexplore.exe 84 PID 3828 wrote to memory of 4188 3828 iexplore.exe 84 PID 3828 wrote to memory of 240 3828 iexplore.exe 85 PID 3828 wrote to memory of 240 3828 iexplore.exe 85 PID 3828 wrote to memory of 240 3828 iexplore.exe 85 PID 3828 wrote to memory of 1400 3828 iexplore.exe 88 PID 3828 wrote to memory of 1400 3828 iexplore.exe 88 PID 3828 wrote to memory of 1400 3828 iexplore.exe 88 PID 3828 wrote to memory of 2552 3828 iexplore.exe 91 PID 3828 wrote to memory of 2552 3828 iexplore.exe 91 PID 3828 wrote to memory of 2552 3828 iexplore.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe"C:\Users\Admin\AppData\Local\Temp\9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\wituv.dll",GetSystemParameter2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4760
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:3420
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4188
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17414 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:240
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17418 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17422 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD54132c54f59c529167c112e7f519120fa
SHA194cc9036fa031258aa744c7ee88e3c0b6c7a73da
SHA256e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb
SHA512e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5c418096100986fce5feb6a233ed6aa13
SHA1a629e4f3b0bfc3bae8d9a93c29ba6c8f15a5a72f
SHA256ccccba1efd9a6f8644aeaaf3304998560d546c6d78a1aa9a4592171087dc0bf0
SHA5121bc97072204136e774b6a86989110d9453878d13bc80b1790068c9b3d398d5315c9f4b346a0116d10ec526b339479d5f0af81cd74dd260d2565ba8104a113800
-
Filesize
144KB
MD5af0735d19fd061f5dd3dad228cf0ad48
SHA1684fe904078ad5f09b2824900bbc3d2c22f22ef7
SHA256f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c
SHA512d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8
-
Filesize
144KB
MD5af0735d19fd061f5dd3dad228cf0ad48
SHA1684fe904078ad5f09b2824900bbc3d2c22f22ef7
SHA256f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c
SHA512d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8
-
Filesize
144KB
MD5af0735d19fd061f5dd3dad228cf0ad48
SHA1684fe904078ad5f09b2824900bbc3d2c22f22ef7
SHA256f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c
SHA512d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8
-
Filesize
144KB
MD5af0735d19fd061f5dd3dad228cf0ad48
SHA1684fe904078ad5f09b2824900bbc3d2c22f22ef7
SHA256f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c
SHA512d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8