Analysis
-
max time kernel
147s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe
Resource
win10v2004-20220812-en
General
-
Target
4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe
-
Size
64KB
-
MD5
39c5dfd26eb0953e2c39e8f16e439d18
-
SHA1
129cc4356400537a182c3bcfe75561dcc3da0a6a
-
SHA256
4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd
-
SHA512
c0ad98b899668acb5b75bc890f4939c1da75157ebfc823e5b0d7d0f88b179f4e16710dca3ad3412c797429bfba32c4765bc8d7b4c26259dd9313adeafd3b19bb
-
SSDEEP
1536:oTrHXebs0VdG/4o0L0/e+7+iIcOemGSUGlH8:yHys0VdTPlee3lH8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 444 Waxzxv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Waxzxv = "C:\\Users\\Admin\\AppData\\Roaming\\Waxzxv.exe" 4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "708850008" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001633" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001633" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377391382" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3E6A6B85-7814-11ED-B696-5ECC372795C7} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "708694712" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe 2728 4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 444 Waxzxv.exe Token: SeDebugPrivilege 5012 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4708 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4708 IEXPLORE.EXE 4708 IEXPLORE.EXE 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2728 wrote to memory of 444 2728 4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe 80 PID 2728 wrote to memory of 444 2728 4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe 80 PID 2728 wrote to memory of 444 2728 4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe 80 PID 444 wrote to memory of 5012 444 Waxzxv.exe 81 PID 444 wrote to memory of 5012 444 Waxzxv.exe 81 PID 444 wrote to memory of 5012 444 Waxzxv.exe 81 PID 5012 wrote to memory of 4708 5012 iexplore.exe 82 PID 5012 wrote to memory of 4708 5012 iexplore.exe 82 PID 444 wrote to memory of 5012 444 Waxzxv.exe 81 PID 444 wrote to memory of 5012 444 Waxzxv.exe 81 PID 4708 wrote to memory of 4000 4708 IEXPLORE.EXE 83 PID 4708 wrote to memory of 4000 4708 IEXPLORE.EXE 83 PID 4708 wrote to memory of 4000 4708 IEXPLORE.EXE 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe"C:\Users\Admin\AppData\Local\Temp\4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\Waxzxv.exe"C:\Users\Admin\AppData\Roaming\Waxzxv.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4708 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4000
-
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD539c5dfd26eb0953e2c39e8f16e439d18
SHA1129cc4356400537a182c3bcfe75561dcc3da0a6a
SHA2564e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd
SHA512c0ad98b899668acb5b75bc890f4939c1da75157ebfc823e5b0d7d0f88b179f4e16710dca3ad3412c797429bfba32c4765bc8d7b4c26259dd9313adeafd3b19bb
-
Filesize
64KB
MD539c5dfd26eb0953e2c39e8f16e439d18
SHA1129cc4356400537a182c3bcfe75561dcc3da0a6a
SHA2564e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd
SHA512c0ad98b899668acb5b75bc890f4939c1da75157ebfc823e5b0d7d0f88b179f4e16710dca3ad3412c797429bfba32c4765bc8d7b4c26259dd9313adeafd3b19bb