Analysis
-
max time kernel
156s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 20:15
Static task
static1
Behavioral task
behavioral1
Sample
155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe
Resource
win10v2004-20220812-en
General
-
Target
155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe
-
Size
361KB
-
MD5
dec1b7b7e4a00d0a1226a1dcb9631c1d
-
SHA1
7bc863aa7f52a195a002f79ae6cf0d3b82f9ecdd
-
SHA256
155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d
-
SHA512
5b656fc20e7ec8c8544c5d0561a048f7dc199a65bb4bf48fd93d59085e31260117b4c390d0b84b4e5054c75d51ae7aeeac570a81c9135c127c25b39122372055
-
SSDEEP
6144:KflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:KflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1592 tgfbwsnmavrplhuq.exe 1544 CreateProcess.exe 436 czvspixtqn.exe 816 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1592 tgfbwsnmavrplhuq.exe 1592 tgfbwsnmavrplhuq.exe 436 czvspixtqn.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 324 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c4e794cde01b749934b05b748354983000000000200000000001066000000010000200000007ac014963ef038c4adb40a1fb922c0a2aa0d8059e526a96165100f885a1aaf51000000000e80000000020000200000009ead03ced992d52c844d4c5057343ba00e98f0713747079fc720c9335287551d200000002d112f5bb66645395a6ac03a0965306016eaf11db9bf5af85c63f3720b3a2f3d40000000a14b3a166fef8511019a794576547c5ec8cc9451975e0d2c26e8cb86afec19b9908489935788ff65aa156e992c4c73c4856476ad05055b391c8ec005750906c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07fb961640cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79E13E71-7857-11ED-B4E9-4A12BD72B3C7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377420255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 1592 tgfbwsnmavrplhuq.exe 1592 tgfbwsnmavrplhuq.exe 1592 tgfbwsnmavrplhuq.exe 1592 tgfbwsnmavrplhuq.exe 1592 tgfbwsnmavrplhuq.exe 1592 tgfbwsnmavrplhuq.exe 1592 tgfbwsnmavrplhuq.exe 436 czvspixtqn.exe 436 czvspixtqn.exe 436 czvspixtqn.exe 436 czvspixtqn.exe 436 czvspixtqn.exe 436 czvspixtqn.exe 436 czvspixtqn.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1528 iexplore.exe 1528 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1592 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 26 PID 1416 wrote to memory of 1592 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 26 PID 1416 wrote to memory of 1592 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 26 PID 1416 wrote to memory of 1592 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 26 PID 1416 wrote to memory of 1528 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 27 PID 1416 wrote to memory of 1528 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 27 PID 1416 wrote to memory of 1528 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 27 PID 1416 wrote to memory of 1528 1416 155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe 27 PID 1528 wrote to memory of 1708 1528 iexplore.exe 29 PID 1528 wrote to memory of 1708 1528 iexplore.exe 29 PID 1528 wrote to memory of 1708 1528 iexplore.exe 29 PID 1528 wrote to memory of 1708 1528 iexplore.exe 29 PID 1592 wrote to memory of 1544 1592 tgfbwsnmavrplhuq.exe 31 PID 1592 wrote to memory of 1544 1592 tgfbwsnmavrplhuq.exe 31 PID 1592 wrote to memory of 1544 1592 tgfbwsnmavrplhuq.exe 31 PID 1592 wrote to memory of 1544 1592 tgfbwsnmavrplhuq.exe 31 PID 436 wrote to memory of 816 436 czvspixtqn.exe 33 PID 436 wrote to memory of 816 436 czvspixtqn.exe 33 PID 436 wrote to memory of 816 436 czvspixtqn.exe 33 PID 436 wrote to memory of 816 436 czvspixtqn.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe"C:\Users\Admin\AppData\Local\Temp\155f7bd9e2fc09d652da9b03c4dfd49bf334e180421841de508bf59798a0703d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Temp\tgfbwsnmavrplhuq.exeC:\Temp\tgfbwsnmavrplhuq.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\czvspixtqn.exe ups_run3⤵
- Executes dropped EXE
PID:1544 -
C:\Temp\czvspixtqn.exeC:\Temp\czvspixtqn.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:436 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:816 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:324
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54b23e4b95ffad68ef98e74aec1c69999
SHA19bbe06f283c4a4d19638639814402d9db124c64e
SHA2561041b5360608fecd3eae4dda14497fd2766ea3d35c639421d1554fdc8410f320
SHA51203de8773247e64e731a9775c34c1a863020aa8481747644a844d81e2191ebe7e914db3f32a1c480db918ce22c944b2281e519504b1b89a259a203f7669a54ee1
-
Filesize
3KB
MD54b23e4b95ffad68ef98e74aec1c69999
SHA19bbe06f283c4a4d19638639814402d9db124c64e
SHA2561041b5360608fecd3eae4dda14497fd2766ea3d35c639421d1554fdc8410f320
SHA51203de8773247e64e731a9775c34c1a863020aa8481747644a844d81e2191ebe7e914db3f32a1c480db918ce22c944b2281e519504b1b89a259a203f7669a54ee1
-
Filesize
361KB
MD5a22591c68684a8e3a1f465af3040ef9c
SHA1abcb5e9b605fb07a3828c3361c0f910de5170384
SHA256281062a3d6d01b5136d13d8090e7e23bba8810e3f48325de6de09697d35519ba
SHA512f1fb2bbb9532ff78aa28d65341352e40ffacb1ea3317041db88d1942b92ae3f178888a5a3a8d5bf43297e2aa07d2ac45ad7da988a0f97e6f63995e0dffba98e1
-
Filesize
361KB
MD53f0d715d210a5ea4550bdd5160e97e8f
SHA17efa52212c24bc7000792b14e7d5fdc501b834a2
SHA25667133299810dee2775d6dd519f782bc74cf85e79fde35a5c2bb14636e80b0457
SHA5121a03284154f05f26d85900f72e15d47b2780032c7ccb9f9cdcfcf01c3849942652a2c7cd96ea978ee7a9a4d97bb023c77abc275842622de08852c31083cff663
-
Filesize
361KB
MD53f0d715d210a5ea4550bdd5160e97e8f
SHA17efa52212c24bc7000792b14e7d5fdc501b834a2
SHA25667133299810dee2775d6dd519f782bc74cf85e79fde35a5c2bb14636e80b0457
SHA5121a03284154f05f26d85900f72e15d47b2780032c7ccb9f9cdcfcf01c3849942652a2c7cd96ea978ee7a9a4d97bb023c77abc275842622de08852c31083cff663
-
Filesize
606B
MD5cced04f00f8f732c4ee24a6528255bc8
SHA1d88e81c6a1388311585cab87c098337ce9685917
SHA2563b5b18590dcb9426891e6d7bb46381449051f8f418441f9dde123541c6a75bf9
SHA512cc62f4acfc4cf0753d1b973acbd5cb66e7a7d1d3c7ce9640797d56c6f832a8eafacf97d34ecd1c691104e58cf81c7e5f795e2e2a1fbf6b28008f17e23dd176ec
-
Filesize
3KB
MD54b23e4b95ffad68ef98e74aec1c69999
SHA19bbe06f283c4a4d19638639814402d9db124c64e
SHA2561041b5360608fecd3eae4dda14497fd2766ea3d35c639421d1554fdc8410f320
SHA51203de8773247e64e731a9775c34c1a863020aa8481747644a844d81e2191ebe7e914db3f32a1c480db918ce22c944b2281e519504b1b89a259a203f7669a54ee1
-
Filesize
3KB
MD54b23e4b95ffad68ef98e74aec1c69999
SHA19bbe06f283c4a4d19638639814402d9db124c64e
SHA2561041b5360608fecd3eae4dda14497fd2766ea3d35c639421d1554fdc8410f320
SHA51203de8773247e64e731a9775c34c1a863020aa8481747644a844d81e2191ebe7e914db3f32a1c480db918ce22c944b2281e519504b1b89a259a203f7669a54ee1
-
Filesize
3KB
MD54b23e4b95ffad68ef98e74aec1c69999
SHA19bbe06f283c4a4d19638639814402d9db124c64e
SHA2561041b5360608fecd3eae4dda14497fd2766ea3d35c639421d1554fdc8410f320
SHA51203de8773247e64e731a9775c34c1a863020aa8481747644a844d81e2191ebe7e914db3f32a1c480db918ce22c944b2281e519504b1b89a259a203f7669a54ee1
-
Filesize
3KB
MD54b23e4b95ffad68ef98e74aec1c69999
SHA19bbe06f283c4a4d19638639814402d9db124c64e
SHA2561041b5360608fecd3eae4dda14497fd2766ea3d35c639421d1554fdc8410f320
SHA51203de8773247e64e731a9775c34c1a863020aa8481747644a844d81e2191ebe7e914db3f32a1c480db918ce22c944b2281e519504b1b89a259a203f7669a54ee1
-
Filesize
361KB
MD53f0d715d210a5ea4550bdd5160e97e8f
SHA17efa52212c24bc7000792b14e7d5fdc501b834a2
SHA25667133299810dee2775d6dd519f782bc74cf85e79fde35a5c2bb14636e80b0457
SHA5121a03284154f05f26d85900f72e15d47b2780032c7ccb9f9cdcfcf01c3849942652a2c7cd96ea978ee7a9a4d97bb023c77abc275842622de08852c31083cff663