Analysis
-
max time kernel
152s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 09:27
Static task
static1
Behavioral task
behavioral1
Sample
372ae2b0f3f8947decc377a03e34e2f61784f94ba6f8dc9825ec8b641c71ac89.exe
Resource
win7-20221111-en
General
-
Target
372ae2b0f3f8947decc377a03e34e2f61784f94ba6f8dc9825ec8b641c71ac89.exe
-
Size
2.3MB
-
MD5
42a36357e26518fa0416e93f4b35a095
-
SHA1
dd538984ff99e6e5fb8f27cdbe708792bac86e92
-
SHA256
372ae2b0f3f8947decc377a03e34e2f61784f94ba6f8dc9825ec8b641c71ac89
-
SHA512
dac3e09353f90e67d7853e5d554388e55f351846ac94204010656811d7c606c96ac9e3a933ede64631260a8a03df91aed08a8f749d2f5920f9095ce3460537b1
-
SSDEEP
49152:Fkd2kemEd8YkBAuQSBn3OfBeCRB4DV5EhuHdsPo2EuiTpG73wMaW:22kZEUGuVCRyx5IOdMJEZLM9
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 372ae2b0f3f8947decc377a03e34e2f61784f94ba6f8dc9825ec8b641c71ac89.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377223956" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af00000000020000000000106600000001000020000000e1c2e45dfa1300361181c5df36a13e35c25478816fcd488cee810f03fd929533000000000e800000000200002000000001531ffdbfe41a545bb5d2b37c249da30d69689852cd79559eb01117446184e820000000ee0d1f8ab47be041b689e00554f13806e9015ebea902f304a4754f4353f0732a40000000e2860c08ac0a2d10806185a256f90cec8a9f5e0ed11818c0c434837ef0402ecac608f71a7daef425782c6d9d60c003119ee3378d2222c0e6f2ebc7bd52246848 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 372ae2b0f3f8947decc377a03e34e2f61784f94ba6f8dc9825ec8b641c71ac89.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7188ED11-768E-11ED-A314-4E1FE69E5DC1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702ccc7a9b0ad901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 572 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1372 372ae2b0f3f8947decc377a03e34e2f61784f94ba6f8dc9825ec8b641c71ac89.exe 1372 372ae2b0f3f8947decc377a03e34e2f61784f94ba6f8dc9825ec8b641c71ac89.exe 572 iexplore.exe 572 iexplore.exe 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 572 wrote to memory of 1536 572 iexplore.exe 30 PID 572 wrote to memory of 1536 572 iexplore.exe 30 PID 572 wrote to memory of 1536 572 iexplore.exe 30 PID 572 wrote to memory of 1536 572 iexplore.exe 30 PID 572 wrote to memory of 1536 572 iexplore.exe 30 PID 572 wrote to memory of 1536 572 iexplore.exe 30 PID 572 wrote to memory of 1536 572 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\372ae2b0f3f8947decc377a03e34e2f61784f94ba6f8dc9825ec8b641c71ac89.exe"C:\Users\Admin\AppData\Local\Temp\372ae2b0f3f8947decc377a03e34e2f61784f94ba6f8dc9825ec8b641c71ac89.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1372
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:572 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9bf4d6b598bc749cb10d5cd124de822
SHA1a63b54b574e1525b0116c9d16598ffaec5bce336
SHA256d9088123c1eb6cb652b994563ab16032520c9269757b1500a2d96c4665433b64
SHA512eea341dcfd1d5ef54f10c2c8566aa8e3c04d9cba2c0224760ee5c5c2538cf72ed5f3b099de45417339653e7058fc7b1f82051d1ac21b7b3f075a02a9c73b9ee3
-
Filesize
608B
MD5268f5c1e4947642d80e16751ef448f01
SHA199444c7cafad2f1317b973cf0593d0f321ca4b31
SHA256aaf8e492ea730ff71b2cf26eed817c06944c777a0e3c2648216d4f7837b487fd
SHA51239078676f43c29edba0c8c43128e4763b521edd96433a9a6bbef535f92f710a661fd36404471e03059b2f75f30d0e3f7e4455eb3e8d77fe2c025a5f6cc71c7ac