Analysis
-
max time kernel
168s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 18:16
Static task
static1
Behavioral task
behavioral1
Sample
tmp0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp0.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
tmp1.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
tmp1.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
tmp2.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
tmp2.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp0.exe
-
Size
10KB
-
MD5
3f6eeec9f05e3c717e17107bf3e88ccf
-
SHA1
f0e0327857b03a81e064531d7cc068cbfafda317
-
SHA256
8f63d726816d34de5844d7e88f18147d3534a81d000350bfdd43dc996371575a
-
SHA512
7eed2e47901af427f7c722bf42c512edbbcb6e518486e55ae904383d28f9f752a8c417653d24dbc17dab15cc7831713173fc55b6ab660431c3f80767b3a259fc
-
SSDEEP
192:IKl8+bbm3+jxmxiFUi3aUdpPgKqAKRsrCN58iWa4put:FlrLyAXHuXNWP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376531189" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AD7B3C6D-75BD-11ED-BF5F-5EDCA19B148A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2600 1612 iexplore.exe 86 PID 1612 wrote to memory of 2600 1612 iexplore.exe 86 PID 1612 wrote to memory of 2600 1612 iexplore.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp0.exe"C:\Users\Admin\AppData\Local\Temp\tmp0.exe"1⤵PID:648
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4056
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
Filesize232B
MD56e9b8bacc419334150d80c398d0a62c4
SHA1275a102229d6947b7f53464ae112c80728828a08
SHA2562950ef7efb81d0fdc7bd7da94834917740fade97b8825f64b01fa842af3be47e
SHA512015f8d566f0a8ede89f0dd3d693557b2a62b25c6dbe1113e7643c36b1e5ef0f92cd0c1d70135f888036e263ac567efb8b17397983010800f55630a12d92c1930