Analysis
-
max time kernel
179s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe
Resource
win10v2004-20220812-en
General
-
Target
c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe
-
Size
120KB
-
MD5
1d5a4288b5cb14e01183b069b81f61a5
-
SHA1
538afe10dc642a12ae73688a6c0a0347abaf34ec
-
SHA256
c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c
-
SHA512
e1762ae4de3030583ac29a89e8b70d1cd97ca6b9c29bf79f2409f59569b61e162feea40c31329ddf1405432442a8eb1a56a858043e0eb9fd04272bf0cc032513
-
SSDEEP
3072:1mKFwHpnmBlLW3JB/DOE3csgK/8CXzrCekTU+:sK+JGs3/CwV05U+
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exedescription pid process target process PID 1144 set thread context of 1708 1144 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{862BD361-7326-11ED-8B55-6651945CA213} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007e0eca9e1a15944fa85d15123b8d5a8a000000000200000000001066000000010000200000006a0b315bbfbc9497927fcf1e71d495b93bfd2f5ebf1216bfa6ffb8eb32b02950000000000e8000000002000020000000dc8dadd9c846d1ff9ba9ff618f87395e2a2387bca3ecc8dee009ba068e4ed335200000001b65d81a4142cabfe5ab0568d4c339446e492c470814ab77630503852c24d171400000008bd53a6ea2e05d2550f75ed0a224f83af90b1ce03e17890db30fa98f211e677d2e270140aff9531de33d0d0878645e9fc4f8393d29ebc9a8d1670e9cf81f84b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a013ea603307d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376849457" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1228 iexplore.exe 1228 iexplore.exe 684 IEXPLORE.EXE 684 IEXPLORE.EXE 684 IEXPLORE.EXE 684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exec6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exeiexplore.exedescription pid process target process PID 1144 wrote to memory of 1708 1144 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe PID 1144 wrote to memory of 1708 1144 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe PID 1144 wrote to memory of 1708 1144 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe PID 1144 wrote to memory of 1708 1144 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe PID 1144 wrote to memory of 1708 1144 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe PID 1144 wrote to memory of 1708 1144 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe PID 1708 wrote to memory of 1228 1708 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe iexplore.exe PID 1708 wrote to memory of 1228 1708 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe iexplore.exe PID 1708 wrote to memory of 1228 1708 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe iexplore.exe PID 1708 wrote to memory of 1228 1708 c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe iexplore.exe PID 1228 wrote to memory of 684 1228 iexplore.exe IEXPLORE.EXE PID 1228 wrote to memory of 684 1228 iexplore.exe IEXPLORE.EXE PID 1228 wrote to memory of 684 1228 iexplore.exe IEXPLORE.EXE PID 1228 wrote to memory of 684 1228 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe"C:\Users\Admin\AppData\Local\Temp\c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe"C:\Users\Admin\AppData\Local\Temp\c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=c6d14b0768a175727a0929c82b7a58b7ca7459b9994d54c1d25233e39856d48c.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD510febc33f056b25895ead87d744cd39c
SHA1cdede1c066269d6810d1e5676eb8396abcbc0306
SHA2569a0350d2bd4dccae878bc91a76cc4c43d5eeef38794872f11fe3e944ac8be431
SHA51276741f59baab52330e45eab2f198726c46c00b29d9d3b178f340e82c815f15012453fc1c824b499b518672b2f6066df0eadd5b4265b660c0d524b02a2c79dd29