Analysis
-
max time kernel
125s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 21:10
Static task
static1
Behavioral task
behavioral1
Sample
b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe
Resource
win10v2004-20220812-en
General
-
Target
b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe
-
Size
361KB
-
MD5
4eea01266c594b5527408d62b2d71116
-
SHA1
78f505f4374a8b321874dff273ce03df657a23a1
-
SHA256
b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c
-
SHA512
c20d2e2eb4a1079780f3dd165fbe5003126e7249a811e64e35cae3c4e027d020821a7ccec30e557db8849110c8cec9dc9ec2a93a7079cf3b328eaef1914d6248
-
SSDEEP
6144:bflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:bflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1348 wvupnbzytsndcxwu.exe 1396 CreateProcess.exe 1516 xuqieaxttp.exe 1568 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1348 wvupnbzytsndcxwu.exe 1348 wvupnbzytsndcxwu.exe 1516 xuqieaxttp.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1360 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bedbf5cc08d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000216050d125668c488187d61b7d2980c0000000000200000000001066000000010000200000000ba8703c15f15fc3802341b64c747e7aef833da826babf36f7908291f2ded690000000000e8000000002000020000000db1cd3206b046858dc958b01f6a1800695de6d1e376a8ba7aa9f11761a3c9bc5200000006a2e6ac321e39e7ff7e6c4d1be98b42d2d4cc886bf3af6f3dd91efe850cfa24e400000006071ac1ed0e3e31a66fb7884944c6b41aac24c4b4d5edc2782f8193e88641a5454912c7a2f07dac14ece87dfb88377b458e1e25926a7351e182fa24575a003a6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15DEF6F1-74C0-11ED-9332-6A94EDCEDC7A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377025366" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 1348 wvupnbzytsndcxwu.exe 1348 wvupnbzytsndcxwu.exe 1348 wvupnbzytsndcxwu.exe 1348 wvupnbzytsndcxwu.exe 1348 wvupnbzytsndcxwu.exe 1348 wvupnbzytsndcxwu.exe 1348 wvupnbzytsndcxwu.exe 1516 xuqieaxttp.exe 1516 xuqieaxttp.exe 1516 xuqieaxttp.exe 1516 xuqieaxttp.exe 1516 xuqieaxttp.exe 1516 xuqieaxttp.exe 1516 xuqieaxttp.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1156 iexplore.exe 1156 iexplore.exe 876 IEXPLORE.EXE 876 IEXPLORE.EXE 876 IEXPLORE.EXE 876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1348 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 26 PID 1424 wrote to memory of 1348 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 26 PID 1424 wrote to memory of 1348 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 26 PID 1424 wrote to memory of 1348 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 26 PID 1424 wrote to memory of 1156 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 27 PID 1424 wrote to memory of 1156 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 27 PID 1424 wrote to memory of 1156 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 27 PID 1424 wrote to memory of 1156 1424 b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe 27 PID 1156 wrote to memory of 876 1156 iexplore.exe 29 PID 1156 wrote to memory of 876 1156 iexplore.exe 29 PID 1156 wrote to memory of 876 1156 iexplore.exe 29 PID 1156 wrote to memory of 876 1156 iexplore.exe 29 PID 1348 wrote to memory of 1396 1348 wvupnbzytsndcxwu.exe 31 PID 1348 wrote to memory of 1396 1348 wvupnbzytsndcxwu.exe 31 PID 1348 wrote to memory of 1396 1348 wvupnbzytsndcxwu.exe 31 PID 1348 wrote to memory of 1396 1348 wvupnbzytsndcxwu.exe 31 PID 1516 wrote to memory of 1568 1516 xuqieaxttp.exe 33 PID 1516 wrote to memory of 1568 1516 xuqieaxttp.exe 33 PID 1516 wrote to memory of 1568 1516 xuqieaxttp.exe 33 PID 1516 wrote to memory of 1568 1516 xuqieaxttp.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe"C:\Users\Admin\AppData\Local\Temp\b6237ce8a27b94f82628050897215257bd4466721b50c13b285e95dc29c3057c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Temp\wvupnbzytsndcxwu.exeC:\Temp\wvupnbzytsndcxwu.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\xuqieaxttp.exe ups_run3⤵
- Executes dropped EXE
PID:1396 -
C:\Temp\xuqieaxttp.exeC:\Temp\xuqieaxttp.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1568 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1360
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1156 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:876
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58f25435ac80caf9b5f1e8a381216f40e
SHA1696e58e2b56e34c3e95ce4599ab5a2854b80f648
SHA2567382ef5061e7db363a74b86fc71fe72e690b5352912017c625986333580ab66c
SHA51221ea100c2b5b59396161a8296bd09ee5e8bccde04cc8b880e72933d03446fddd3cbd25e0d03b7b223ff570f0b10c0efe3ab369108335977b9c36c88233808e2b
-
Filesize
3KB
MD58f25435ac80caf9b5f1e8a381216f40e
SHA1696e58e2b56e34c3e95ce4599ab5a2854b80f648
SHA2567382ef5061e7db363a74b86fc71fe72e690b5352912017c625986333580ab66c
SHA51221ea100c2b5b59396161a8296bd09ee5e8bccde04cc8b880e72933d03446fddd3cbd25e0d03b7b223ff570f0b10c0efe3ab369108335977b9c36c88233808e2b
-
Filesize
361KB
MD58ab5f33f5e032f18bd92064af1314d01
SHA1bf69d50973e250ea9c8e137ede411500f6cca4ae
SHA2569052e637be61e636b5ac0ee769e90bead089554a62604862a8f0cc95196ff5dc
SHA51247fce53d781a0109e21c78877517e0cdb93ff2518ebb1e9513b26c414ff2b43d7d26a283c096cc964f97efed5b5beadeada65fc71e1bac1ce5d6143156a25ecc
-
Filesize
361KB
MD58ab5f33f5e032f18bd92064af1314d01
SHA1bf69d50973e250ea9c8e137ede411500f6cca4ae
SHA2569052e637be61e636b5ac0ee769e90bead089554a62604862a8f0cc95196ff5dc
SHA51247fce53d781a0109e21c78877517e0cdb93ff2518ebb1e9513b26c414ff2b43d7d26a283c096cc964f97efed5b5beadeada65fc71e1bac1ce5d6143156a25ecc
-
Filesize
361KB
MD5c055ccdecbb8c9aef6d603027ccc902b
SHA1caa607706c6aa0b91d7326488a51547fc04fb54c
SHA256b141faa0f346f3490c9bb16743d0d4ed8d8432f550d58f8f273c685bbe5860ba
SHA512741749a08542daf0f1a2a7cf4a7e51482610da21cd623603de8376bfb6dc1caabe5eb93c5aa72dc42b7fc9dfba1988054e26fa4f81f55a6eff747c22a34afffc
-
Filesize
595B
MD59eeaa9f099d19cf8e8a9255b300ed5a7
SHA1e8b3ff5a0f89313def4339f38e820ff4ccc5b63a
SHA25614187b9de67f6bc4acbb6fe4530914d80b3a033fb75a21e2d2186faf2f4ad105
SHA512aff54b69cfd303fe94b2e0ff6a9c14ff37d6594fce2dbd4e3d898657ddd950cf0993256520e00cff9dcb3d3068044dc0fc6787ab7761466aed6a61cb87ffc858
-
Filesize
3KB
MD58f25435ac80caf9b5f1e8a381216f40e
SHA1696e58e2b56e34c3e95ce4599ab5a2854b80f648
SHA2567382ef5061e7db363a74b86fc71fe72e690b5352912017c625986333580ab66c
SHA51221ea100c2b5b59396161a8296bd09ee5e8bccde04cc8b880e72933d03446fddd3cbd25e0d03b7b223ff570f0b10c0efe3ab369108335977b9c36c88233808e2b
-
Filesize
3KB
MD58f25435ac80caf9b5f1e8a381216f40e
SHA1696e58e2b56e34c3e95ce4599ab5a2854b80f648
SHA2567382ef5061e7db363a74b86fc71fe72e690b5352912017c625986333580ab66c
SHA51221ea100c2b5b59396161a8296bd09ee5e8bccde04cc8b880e72933d03446fddd3cbd25e0d03b7b223ff570f0b10c0efe3ab369108335977b9c36c88233808e2b
-
Filesize
3KB
MD58f25435ac80caf9b5f1e8a381216f40e
SHA1696e58e2b56e34c3e95ce4599ab5a2854b80f648
SHA2567382ef5061e7db363a74b86fc71fe72e690b5352912017c625986333580ab66c
SHA51221ea100c2b5b59396161a8296bd09ee5e8bccde04cc8b880e72933d03446fddd3cbd25e0d03b7b223ff570f0b10c0efe3ab369108335977b9c36c88233808e2b
-
Filesize
3KB
MD58f25435ac80caf9b5f1e8a381216f40e
SHA1696e58e2b56e34c3e95ce4599ab5a2854b80f648
SHA2567382ef5061e7db363a74b86fc71fe72e690b5352912017c625986333580ab66c
SHA51221ea100c2b5b59396161a8296bd09ee5e8bccde04cc8b880e72933d03446fddd3cbd25e0d03b7b223ff570f0b10c0efe3ab369108335977b9c36c88233808e2b
-
Filesize
361KB
MD58ab5f33f5e032f18bd92064af1314d01
SHA1bf69d50973e250ea9c8e137ede411500f6cca4ae
SHA2569052e637be61e636b5ac0ee769e90bead089554a62604862a8f0cc95196ff5dc
SHA51247fce53d781a0109e21c78877517e0cdb93ff2518ebb1e9513b26c414ff2b43d7d26a283c096cc964f97efed5b5beadeada65fc71e1bac1ce5d6143156a25ecc