Analysis
-
max time kernel
128s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe
Resource
win10v2004-20220901-en
General
-
Target
c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe
-
Size
361KB
-
MD5
81d45f924f9d173b52de24dfe4ef3612
-
SHA1
2837e9dc2edff7dd1c8f48d8be2614470e86eb14
-
SHA256
c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2
-
SHA512
ca5163c305104bd586e1ebf16b7c6ffb2235f12fd2fa3a1bb6c8c8d26998a9caaf67ee34d440901b7b15283bde07293323742807c0d00d061898641254090ae7
-
SSDEEP
6144:7flfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:7flfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 896 uqlkytpkjesomidz.exe 756 CreateProcess.exe 1284 pmicyvsoiw.exe 1352 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 896 uqlkytpkjesomidz.exe 896 uqlkytpkjesomidz.exe 1284 pmicyvsoiw.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1772 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377132500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000074e450f54184245b20c1d2ac362b5560000000002000000000010660000000100002000000009babda3fd6c92f4a76735ee42af8b1dcee800bf53d61da4f8426e769a1cf18d000000000e800000000200002000000086f2e2b2e782420a32f97d6fbad561ae9906f6410c4d204340dcf0530ca53190200000007ccede5e74cb10dd0fba81604147981460ca8fc7dfdf9b3015a58ace35c9be7e400000003ebe81cdcd83fdb3bcc7bc74e8c930127035dfb6bcf5350fa266a7d5faf3d1560620428f4576f588e93754bbc02ae64db3e809515c6bcdab73f243b044d1e303 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0267e69c609d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85A322F1-75B9-11ED-A923-6651945CA213} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 896 uqlkytpkjesomidz.exe 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 896 uqlkytpkjesomidz.exe 896 uqlkytpkjesomidz.exe 896 uqlkytpkjesomidz.exe 896 uqlkytpkjesomidz.exe 896 uqlkytpkjesomidz.exe 896 uqlkytpkjesomidz.exe 1284 pmicyvsoiw.exe 1284 pmicyvsoiw.exe 1284 pmicyvsoiw.exe 1284 pmicyvsoiw.exe 1284 pmicyvsoiw.exe 1284 pmicyvsoiw.exe 1284 pmicyvsoiw.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 972 iexplore.exe 972 iexplore.exe 1776 IEXPLORE.EXE 1776 IEXPLORE.EXE 1776 IEXPLORE.EXE 1776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1992 wrote to memory of 896 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 26 PID 1992 wrote to memory of 896 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 26 PID 1992 wrote to memory of 896 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 26 PID 1992 wrote to memory of 896 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 26 PID 1992 wrote to memory of 972 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 27 PID 1992 wrote to memory of 972 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 27 PID 1992 wrote to memory of 972 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 27 PID 1992 wrote to memory of 972 1992 c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe 27 PID 972 wrote to memory of 1776 972 iexplore.exe 29 PID 972 wrote to memory of 1776 972 iexplore.exe 29 PID 972 wrote to memory of 1776 972 iexplore.exe 29 PID 972 wrote to memory of 1776 972 iexplore.exe 29 PID 896 wrote to memory of 756 896 uqlkytpkjesomidz.exe 31 PID 896 wrote to memory of 756 896 uqlkytpkjesomidz.exe 31 PID 896 wrote to memory of 756 896 uqlkytpkjesomidz.exe 31 PID 896 wrote to memory of 756 896 uqlkytpkjesomidz.exe 31 PID 1284 wrote to memory of 1352 1284 pmicyvsoiw.exe 33 PID 1284 wrote to memory of 1352 1284 pmicyvsoiw.exe 33 PID 1284 wrote to memory of 1352 1284 pmicyvsoiw.exe 33 PID 1284 wrote to memory of 1352 1284 pmicyvsoiw.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe"C:\Users\Admin\AppData\Local\Temp\c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Temp\uqlkytpkjesomidz.exeC:\Temp\uqlkytpkjesomidz.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\pmicyvsoiw.exe ups_run3⤵
- Executes dropped EXE
PID:756 -
C:\Temp\pmicyvsoiw.exeC:\Temp\pmicyvsoiw.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1352 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1772
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:972 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD573e5f7043242fe21c9dcd6027b796458
SHA17d04f78ed942c7f41bc1b6fd33dca651c18f70b4
SHA256283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a
SHA51267d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a
-
Filesize
3KB
MD573e5f7043242fe21c9dcd6027b796458
SHA17d04f78ed942c7f41bc1b6fd33dca651c18f70b4
SHA256283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a
SHA51267d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a
-
Filesize
361KB
MD57212e8bc282f1c525c218d954977cd77
SHA166b3f15ef811e1f993455b8db151981742747d65
SHA256b283fe071de412ebbcb08018acccc5e6e2103708363dfd6fd85af071c97c6a25
SHA512d65db2a0f7fb32665d64eb56cc1ad20e4346aa56673634ac820ebcb756d146ec60ac54371fde6b078a6a1dc324bcdbaad6d897f36ef2e12b35fd983c74e304db
-
Filesize
361KB
MD5fdffc75ca5c6e655d9752f896eea575c
SHA1c30a30effd79784ba9f74309823f5e379a2f7b15
SHA256ebabe90b9a98aa8c703833e650606f602ad9d7e7fef4a6bfaef62ea08a6de4e5
SHA5125622cce1fec805e4c45a4200591d0bb79a693722824b3c765309a62dc706d9c9e9fe43869f555c4b2fa366ce9158d1675044c3a74b6dbe6c6b36de1f77ba7a96
-
Filesize
361KB
MD5fdffc75ca5c6e655d9752f896eea575c
SHA1c30a30effd79784ba9f74309823f5e379a2f7b15
SHA256ebabe90b9a98aa8c703833e650606f602ad9d7e7fef4a6bfaef62ea08a6de4e5
SHA5125622cce1fec805e4c45a4200591d0bb79a693722824b3c765309a62dc706d9c9e9fe43869f555c4b2fa366ce9158d1675044c3a74b6dbe6c6b36de1f77ba7a96
-
Filesize
606B
MD5113eb6f71a23d5f53c6b86995af9e3c0
SHA1ed8a947e23d6dbaf22ebc8d66fa1956a916378ab
SHA256f5b728ee13346f6c92ce8706d24f6fd8c62fd531156dd46442b4864ff425f169
SHA51204e0b919d48b3b7ebdb424b72b7de2ad8730d71c2d86db2575d40ab30efc5524e8d49339b85acbce2af818a107ccf9533b2bbabd83e68e54f3831d1b0e3338ce
-
Filesize
3KB
MD573e5f7043242fe21c9dcd6027b796458
SHA17d04f78ed942c7f41bc1b6fd33dca651c18f70b4
SHA256283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a
SHA51267d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a
-
Filesize
3KB
MD573e5f7043242fe21c9dcd6027b796458
SHA17d04f78ed942c7f41bc1b6fd33dca651c18f70b4
SHA256283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a
SHA51267d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a
-
Filesize
3KB
MD573e5f7043242fe21c9dcd6027b796458
SHA17d04f78ed942c7f41bc1b6fd33dca651c18f70b4
SHA256283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a
SHA51267d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a
-
Filesize
3KB
MD573e5f7043242fe21c9dcd6027b796458
SHA17d04f78ed942c7f41bc1b6fd33dca651c18f70b4
SHA256283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a
SHA51267d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a
-
Filesize
361KB
MD5fdffc75ca5c6e655d9752f896eea575c
SHA1c30a30effd79784ba9f74309823f5e379a2f7b15
SHA256ebabe90b9a98aa8c703833e650606f602ad9d7e7fef4a6bfaef62ea08a6de4e5
SHA5125622cce1fec805e4c45a4200591d0bb79a693722824b3c765309a62dc706d9c9e9fe43869f555c4b2fa366ce9158d1675044c3a74b6dbe6c6b36de1f77ba7a96