Analysis
-
max time kernel
141s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 19:05
Static task
static1
Behavioral task
behavioral1
Sample
b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe
Resource
win10v2004-20220812-en
General
-
Target
b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe
-
Size
1.1MB
-
MD5
39ecc70c2d2baf144d81c8a8c930c064
-
SHA1
bd2313bed774d4804de7e2ce65a9820c81a91c73
-
SHA256
b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449
-
SHA512
bb8a79f8336b8de9150bc59274bd762a20eee2a900a1592e6f87bd18a32af0f3f359e556549016ec67fb701d082440c8d76b9ec9196dffa839e358912fd2e8a9
-
SSDEEP
24576:PC7I14/6ZNetmSwfC7lZwhgppoud4UvMt:qk7Md
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
win34.exepid process 888 win34.exe -
Loads dropped DLL 2 IoCs
Processes:
b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exepid process 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\runAPI74 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\runAPI45.exe\"" b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exedescription pid process target process PID 956 set thread context of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af00000000020000000000106600000001000020000000571d947ef87a2dafefa6588a658d701210b693f6b58e54b59137c3393b01ceff000000000e80000000020000200000004db53ccf4de67779d1d7a2c140486c6144ac2e621b84a2f6d7af0bfb55c8008c2000000039d21301971b4f3eb94129a2b77ec25af92d0a237ce166c407a5ed4fc581df094000000064e1ea5f5f47998487958944a1dc73fec6f83e49cfc60e09ecbfa3a48546e06e42f8e99b652ab3c5131a1880737b88c2156c8a9b853c4bfb9f34cdd6239fcd31 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01618358b07d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A0F5DE0-737E-11ED-AFC0-6662AD81E03A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376887153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 276 iexplore.exe 276 iexplore.exe 912 IEXPLORE.EXE 912 IEXPLORE.EXE 912 IEXPLORE.EXE 912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exewin34.exeiexplore.exedescription pid process target process PID 956 wrote to memory of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe PID 956 wrote to memory of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe PID 956 wrote to memory of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe PID 956 wrote to memory of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe PID 956 wrote to memory of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe PID 956 wrote to memory of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe PID 956 wrote to memory of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe PID 956 wrote to memory of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe PID 956 wrote to memory of 888 956 b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe win34.exe PID 888 wrote to memory of 276 888 win34.exe iexplore.exe PID 888 wrote to memory of 276 888 win34.exe iexplore.exe PID 888 wrote to memory of 276 888 win34.exe iexplore.exe PID 888 wrote to memory of 276 888 win34.exe iexplore.exe PID 276 wrote to memory of 912 276 iexplore.exe IEXPLORE.EXE PID 276 wrote to memory of 912 276 iexplore.exe IEXPLORE.EXE PID 276 wrote to memory of 912 276 iexplore.exe IEXPLORE.EXE PID 276 wrote to memory of 912 276 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe"C:\Users\Admin\AppData\Local\Temp\b52230ba0750810d362bf8f58f0332eec710ce0e6b61fd89b68d0dc108f53449.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\win34.exeC:\Users\Admin\AppData\Local\Temp\win34.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=win34.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea
-
Filesize
533B
MD56484c5f9e7a22a9218624eb4c489b8dc
SHA1516cdc6ce161ca1b7f29550fe7c1b697c0ed63d0
SHA256541bbe8f4227d5f051409903d12fac2a62dd4f56411552ca9b613916e533355c
SHA512dfa70900aa5849761fa25bdf4240af0d362955aabe2f235dbc7effe0f8f0f0e167151c871858d67ee7159db85135ab45fdeb2aea27f61d45866ed1d41dfe3385
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea