Analysis
-
max time kernel
118s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 01:46
Behavioral task
behavioral1
Sample
8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe
Resource
win10v2004-20221111-en
General
-
Target
8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe
-
Size
26KB
-
MD5
8595535b946f18c37051d3a1e8cbac07
-
SHA1
061fae33fc7d5ce3fe859c7315e292634d8eb511
-
SHA256
8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc
-
SHA512
dfc20b9fc9adfa5bbb27bde4941d813438260940743af00b9c275cbeee9bd0d9f488d4827e90d048f9e259b033296c492a0c404c541d395d4bfaeeb6837457f3
-
SSDEEP
768:NYzN0KzwUbKS3Eaj4FPSWVpQL9SUIcBFitkjAmiW:N00KzwUbPUFP1Q5S/cBo5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
mstre19.exepid process 940 mstre19.exe -
Processes:
resource yara_rule C:\Windows\mstre19.exe upx behavioral1/memory/2020-59-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1560 cmd.exe -
Drops file in Windows directory 4 IoCs
Processes:
8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exemstre19.exedescription ioc process File opened for modification \??\c:\windows\mstre19.exe 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe File created \??\c:\windows\mstre19.exe 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe File opened for modification \??\c:\windows\msmark2.dat mstre19.exe File created \??\c:\windows\msmark2.dat mstre19.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377317151" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7184D931-7767-11ED-BD84-7E4CDA66D2DC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Modifies registry class 4 IoCs
Processes:
regedit.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/xhtml+xml\Encoding = 08000000 regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mime\Database\Content Type\application/xhtml+xml regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/xhtml+xml\CLSID = "{25336920-03F9-11cf-8FD0-00AA00686F13}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/xhtml+xml\Extension = ".xml" regedit.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 1640 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1192 iexplore.exe 1192 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exeiexplore.exemstre19.exedescription pid process target process PID 2020 wrote to memory of 940 2020 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe mstre19.exe PID 2020 wrote to memory of 940 2020 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe mstre19.exe PID 2020 wrote to memory of 940 2020 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe mstre19.exe PID 2020 wrote to memory of 940 2020 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe mstre19.exe PID 2020 wrote to memory of 1560 2020 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe cmd.exe PID 2020 wrote to memory of 1560 2020 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe cmd.exe PID 2020 wrote to memory of 1560 2020 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe cmd.exe PID 2020 wrote to memory of 1560 2020 8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe cmd.exe PID 1192 wrote to memory of 1332 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 1332 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 1332 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 1332 1192 iexplore.exe IEXPLORE.EXE PID 940 wrote to memory of 1640 940 mstre19.exe regedit.exe PID 940 wrote to memory of 1640 940 mstre19.exe regedit.exe PID 940 wrote to memory of 1640 940 mstre19.exe regedit.exe PID 940 wrote to memory of 1640 940 mstre19.exe regedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe"C:\Users\Admin\AppData\Local\Temp\8c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\mstre19.exec:\windows\mstre19.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\SysWOW64\regedit.exeregedit /s c:\2.reg3⤵
- Modifies registry class
- Runs .reg file with regedit
-
C:\Windows\SysWOW64\cmd.execmd /c c:\4321f456.bat2⤵
- Deletes itself
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\15377Q70.txtFilesize
608B
MD599324b610730a7cec719483d3600b028
SHA1682072116b4f336dda4b4b0c16a84a4eb20a0995
SHA2561340333460b80cfd94d05979389bf695f88dd54176b341ca3fcb68c1630b41e4
SHA512b22a91f3a0fa4a1b956d5967c10c2c5a96a7a59a40f6e2fc6462cc0b5901343c49b470f1c8596570dc9c32f2b2a7be886c345236c31462fa30951855d8af2e90
-
C:\Windows\mstre19.exeFilesize
26KB
MD58595535b946f18c37051d3a1e8cbac07
SHA1061fae33fc7d5ce3fe859c7315e292634d8eb511
SHA2568c95640230dd09c29d68420665a9ee492c03f3d5a59084819c380046e692e3cc
SHA512dfc20b9fc9adfa5bbb27bde4941d813438260940743af00b9c275cbeee9bd0d9f488d4827e90d048f9e259b033296c492a0c404c541d395d4bfaeeb6837457f3
-
\??\c:\2.regFilesize
202B
MD5428090d84a47f875c8fdd6d0258f00c5
SHA196c029720065ac1dc5ece2a5481b780267d7b439
SHA2568c8668f6339728aebfc08e547f15b0e250f6a551be86f47fcb6098ffe37f0404
SHA512f752bf52b359a5a82e821ee288e11cd4176c39ac3c932c6f44db69780c6e2597e654bbb3a9db9c32f8659d5af66fa9578b5625758b1f6db70c1314369dbadf7d
-
\??\c:\4321f456.batFilesize
306B
MD57463340f8e25ce5b7391e9deaa84302c
SHA176f9a3cc5f769011e69e5ead350e4a7fdd920997
SHA25635f20cb6d8b21a0c209e2145ee161b3525377ee4ee5465e658842c4eb2bc88d7
SHA512bcb280a8f465375d3b473c7f13c92e980f9b92bf9f4b401a94ee4f1f2b19bb44fb18532834ccb363dda714a493bbffb93aa66dc62eeb2b2c3e1c11320304c5e0
-
memory/940-55-0x0000000000000000-mapping.dmp
-
memory/1560-58-0x0000000000000000-mapping.dmp
-
memory/1640-61-0x0000000000000000-mapping.dmp
-
memory/2020-54-0x00000000756B1000-0x00000000756B3000-memory.dmpFilesize
8KB
-
memory/2020-59-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB