Analysis
-
max time kernel
149s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe
Resource
win10v2004-20220812-en
General
-
Target
cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe
-
Size
361KB
-
MD5
ef7a1e5a979f16d72f3dd749bdb4697f
-
SHA1
f1a34b0ae2655a3b61f7c15ea3e26cb4cfb15aa5
-
SHA256
cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3
-
SHA512
23a92e4d5f8e595eb02ab169d01368f697649318bec86ce95949bdb829fc015dd4fc0151e8b3b74d90d4e3245a34cc0cb162f9f07b87fba4c913c2261e0bfe1b
-
SSDEEP
6144:fflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:fflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 916 tpnjesrmidzylhcy.exe 2012 CreateProcess.exe 2024 tpmlieaxwt.exe 1000 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 916 tpnjesrmidzylhcy.exe 916 tpnjesrmidzylhcy.exe 2024 tpmlieaxwt.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 776 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21D69140-7856-11ED-B390-DA7E66F9F45D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 916 tpnjesrmidzylhcy.exe 916 tpnjesrmidzylhcy.exe 916 tpnjesrmidzylhcy.exe 916 tpnjesrmidzylhcy.exe 916 tpnjesrmidzylhcy.exe 916 tpnjesrmidzylhcy.exe 916 tpnjesrmidzylhcy.exe 2024 tpmlieaxwt.exe 2024 tpmlieaxwt.exe 2024 tpmlieaxwt.exe 2024 tpmlieaxwt.exe 2024 tpmlieaxwt.exe 2024 tpmlieaxwt.exe 2024 tpmlieaxwt.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 964 iexplore.exe 964 iexplore.exe 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1844 wrote to memory of 916 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 27 PID 1844 wrote to memory of 916 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 27 PID 1844 wrote to memory of 916 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 27 PID 1844 wrote to memory of 916 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 27 PID 1844 wrote to memory of 964 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 28 PID 1844 wrote to memory of 964 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 28 PID 1844 wrote to memory of 964 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 28 PID 1844 wrote to memory of 964 1844 cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe 28 PID 964 wrote to memory of 1516 964 iexplore.exe 30 PID 964 wrote to memory of 1516 964 iexplore.exe 30 PID 964 wrote to memory of 1516 964 iexplore.exe 30 PID 964 wrote to memory of 1516 964 iexplore.exe 30 PID 916 wrote to memory of 2012 916 tpnjesrmidzylhcy.exe 32 PID 916 wrote to memory of 2012 916 tpnjesrmidzylhcy.exe 32 PID 916 wrote to memory of 2012 916 tpnjesrmidzylhcy.exe 32 PID 916 wrote to memory of 2012 916 tpnjesrmidzylhcy.exe 32 PID 2024 wrote to memory of 1000 2024 tpmlieaxwt.exe 34 PID 2024 wrote to memory of 1000 2024 tpmlieaxwt.exe 34 PID 2024 wrote to memory of 1000 2024 tpmlieaxwt.exe 34 PID 2024 wrote to memory of 1000 2024 tpmlieaxwt.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe"C:\Users\Admin\AppData\Local\Temp\cd3a1932dfc6649c60f0cb8d1bc66176a809c9bc7e6705454b918f1c946774d3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Temp\tpnjesrmidzylhcy.exeC:\Temp\tpnjesrmidzylhcy.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:916 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\tpmlieaxwt.exe ups_run3⤵
- Executes dropped EXE
PID:2012 -
C:\Temp\tpmlieaxwt.exeC:\Temp\tpmlieaxwt.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1000 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:776
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f027a7aaa3aacbdba7cbaff7eb6885f3
SHA19ca4b63a3c7182339a39eb1be331e75f73dd0174
SHA256f1510a3ba698d4a4dbd34126a5b90e5f27ef6d1a11e04358526d63b7a6bd92cf
SHA5125ec5adecb0884838d2d2a93ae8db1174be4a2b12cdcf7bebc1e9dd6716d8512bbda7dc647acb6b96cbe7b78f42ebbd74d3fd64355cc35636ea9a859e63252000
-
Filesize
3KB
MD5f027a7aaa3aacbdba7cbaff7eb6885f3
SHA19ca4b63a3c7182339a39eb1be331e75f73dd0174
SHA256f1510a3ba698d4a4dbd34126a5b90e5f27ef6d1a11e04358526d63b7a6bd92cf
SHA5125ec5adecb0884838d2d2a93ae8db1174be4a2b12cdcf7bebc1e9dd6716d8512bbda7dc647acb6b96cbe7b78f42ebbd74d3fd64355cc35636ea9a859e63252000
-
Filesize
361KB
MD526c46f300bddb1c18048fb383fb84a7e
SHA16acfec00eb0617d3d6202666b590f3c03bf25266
SHA256d6df1ceaf763dca2a0be2d21c1f1e8ffef88625c1720c413e1b06a5c80772e72
SHA5124214e9e697fd9ae6054373cf77399f3e47b43045b495b055948b3d4fde3016c72b27293a86bf08f7599c28a1ef98db583b0802c347b235ec749a1753276d1c3c
-
Filesize
361KB
MD5c43a8ab81130c6a7ec6d95ccf1190f84
SHA1117fc226ed1c192dcb97bef90305f015a9ee9553
SHA256466acb020eccea91848bed101004de52ad44f8a053517473f967bfef1edcfaa0
SHA512697fc215c4121868262b8ee8c9738541358f2fa2de7c58f15e3394c934f8046a203e4cc27b76a32da270c319c285f2905d70e704ab8297f5e4a99d6f2828648c
-
Filesize
361KB
MD5c43a8ab81130c6a7ec6d95ccf1190f84
SHA1117fc226ed1c192dcb97bef90305f015a9ee9553
SHA256466acb020eccea91848bed101004de52ad44f8a053517473f967bfef1edcfaa0
SHA512697fc215c4121868262b8ee8c9738541358f2fa2de7c58f15e3394c934f8046a203e4cc27b76a32da270c319c285f2905d70e704ab8297f5e4a99d6f2828648c
-
Filesize
3KB
MD5f027a7aaa3aacbdba7cbaff7eb6885f3
SHA19ca4b63a3c7182339a39eb1be331e75f73dd0174
SHA256f1510a3ba698d4a4dbd34126a5b90e5f27ef6d1a11e04358526d63b7a6bd92cf
SHA5125ec5adecb0884838d2d2a93ae8db1174be4a2b12cdcf7bebc1e9dd6716d8512bbda7dc647acb6b96cbe7b78f42ebbd74d3fd64355cc35636ea9a859e63252000
-
Filesize
3KB
MD5f027a7aaa3aacbdba7cbaff7eb6885f3
SHA19ca4b63a3c7182339a39eb1be331e75f73dd0174
SHA256f1510a3ba698d4a4dbd34126a5b90e5f27ef6d1a11e04358526d63b7a6bd92cf
SHA5125ec5adecb0884838d2d2a93ae8db1174be4a2b12cdcf7bebc1e9dd6716d8512bbda7dc647acb6b96cbe7b78f42ebbd74d3fd64355cc35636ea9a859e63252000
-
Filesize
3KB
MD5f027a7aaa3aacbdba7cbaff7eb6885f3
SHA19ca4b63a3c7182339a39eb1be331e75f73dd0174
SHA256f1510a3ba698d4a4dbd34126a5b90e5f27ef6d1a11e04358526d63b7a6bd92cf
SHA5125ec5adecb0884838d2d2a93ae8db1174be4a2b12cdcf7bebc1e9dd6716d8512bbda7dc647acb6b96cbe7b78f42ebbd74d3fd64355cc35636ea9a859e63252000
-
Filesize
3KB
MD5f027a7aaa3aacbdba7cbaff7eb6885f3
SHA19ca4b63a3c7182339a39eb1be331e75f73dd0174
SHA256f1510a3ba698d4a4dbd34126a5b90e5f27ef6d1a11e04358526d63b7a6bd92cf
SHA5125ec5adecb0884838d2d2a93ae8db1174be4a2b12cdcf7bebc1e9dd6716d8512bbda7dc647acb6b96cbe7b78f42ebbd74d3fd64355cc35636ea9a859e63252000
-
Filesize
361KB
MD5c43a8ab81130c6a7ec6d95ccf1190f84
SHA1117fc226ed1c192dcb97bef90305f015a9ee9553
SHA256466acb020eccea91848bed101004de52ad44f8a053517473f967bfef1edcfaa0
SHA512697fc215c4121868262b8ee8c9738541358f2fa2de7c58f15e3394c934f8046a203e4cc27b76a32da270c319c285f2905d70e704ab8297f5e4a99d6f2828648c