Analysis
-
max time kernel
111s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe
Resource
win10v2004-20221111-en
General
-
Target
9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe
-
Size
1.9MB
-
MD5
eafb2268dce3fc9a424cfc458aa7df08
-
SHA1
e7ef6cdaec0b05cabf0f01e01b7b7542e2a4c31e
-
SHA256
9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44
-
SHA512
bc62f3b92abdff6c72f660cbc1da1b4f6cd2ad710c524b62aa59ba5d09ba8960be1a70534ee4e974485b4826e9aad49ca638ec400fd1cb94c4b2d1a3470f62fc
-
SSDEEP
49152:z6U5n3lF/ZZO85T3Apg6eed/NObJ30DEKwAWGNsUKK:z6U5n1FxZOWTQpg6e+/NOZI7NkK
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{RLH43PC7-7E10-H14B-4303-N4OLT51B3VG2} 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{RLH43PC7-7E10-H14B-4303-N4OLT51B3VG2}\StubPath = "C:\\Windows\\buneno.exe Restart" 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\buneno = "C:\\Windows\\buneno.exe" 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\buneno = "C:\\Windows\\buneno.exe" 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1476 set thread context of 944 1476 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 27 PID 944 set thread context of 0 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe PID 944 set thread context of 1788 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 28 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\buneno.exe 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe File created C:\Windows\buneno.exe 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8AD03B1-77DF-11ED-AA2C-DE5CC620A9B4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377368920" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 1788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1788 iexplore.exe 1788 iexplore.exe 1396 IEXPLORE.EXE 1396 IEXPLORE.EXE 1396 IEXPLORE.EXE 1396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1476 wrote to memory of 944 1476 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 27 PID 1476 wrote to memory of 944 1476 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 27 PID 1476 wrote to memory of 944 1476 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 27 PID 1476 wrote to memory of 944 1476 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 27 PID 1476 wrote to memory of 944 1476 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 27 PID 1476 wrote to memory of 944 1476 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 27 PID 944 wrote to memory of 1788 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 28 PID 944 wrote to memory of 1788 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 28 PID 944 wrote to memory of 1788 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 28 PID 944 wrote to memory of 1788 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 28 PID 944 wrote to memory of 1788 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 28 PID 944 wrote to memory of 1380 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 15 PID 944 wrote to memory of 1380 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 15 PID 944 wrote to memory of 1380 944 9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe 15 PID 1788 wrote to memory of 1396 1788 iexplore.exe 30 PID 1788 wrote to memory of 1396 1788 iexplore.exe 30 PID 1788 wrote to memory of 1396 1788 iexplore.exe 30 PID 1788 wrote to memory of 1396 1788 iexplore.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe"C:\Users\Admin\AppData\Local\Temp\9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe"C:\Users\Admin\AppData\Local\Temp\9cdbc93cfce44e75107e108fa4c265221969f4c490c30d978fb8012fc6b35b44.exe"3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1396
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD549fee5ee886ce70536e036449e20757c
SHA15ab09000cb5c034e49e6561239003e30cae66919
SHA256c5f216cf60d021d5d87c273b4a15c0d7134c22020bda83c12be03aa01d667892
SHA5122080f91c4ae0b802b59f34931576783afa8a7d195f933febcc8e8a4531770ead9aff40e51813b193ce628145a56212d9ccf353f754bc9c0e459e53c5c152de56
-
Filesize
601B
MD5e8ec53651c96a82da95460f9cd0350f9
SHA17faf382071798d163242a0ab1455c565ec92ef3c
SHA2563b14a902040ccfe38ef24412b09b1de6cc6417fddf1dd61335cc111ee2533e91
SHA51266ca5e689e6130cecc41205978ed21d4e183482daa0e10a866d6bb8692f86a34b59b8da6d928a762b7ebbebc446347a35803569bc3148a4ddcd966ef69bc824d