Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 20:14
Static task
static1
Behavioral task
behavioral1
Sample
6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe
Resource
win10v2004-20220901-en
General
-
Target
6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe
-
Size
361KB
-
MD5
2c480ac0bf6bd649feae3568ea2303bd
-
SHA1
1107b109246056391664e95ca05505e0ddcefa49
-
SHA256
6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b
-
SHA512
b69bc8f31a0d56b510e1e6e5bf6b1eec2192a287f0f8822372fb0ecf4b18f07895249ee189425d50db47947f62f6391b09915c4d6fed02a472d28023c406406e
-
SSDEEP
6144:GflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:GflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 940 xtrqlcxvupobayts.exe 1928 CreateProcess.exe 1884 khyvronkgc.exe 1816 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 940 xtrqlcxvupobayts.exe 940 xtrqlcxvupobayts.exe 1884 khyvronkgc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2000 ipconfig.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0259b2d5b0cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D8436B1-784E-11ED-954F-D29BCC0F3FEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000581189f8a37d854aa01043fae9336ce0000000000200000000001066000000010000200000006fd9027e08099499caeb7cefdbc733c3317f47535554d0e5b98dac8b2fb483c0000000000e800000000200002000000011e496b24ae7f1598d2ead73384dc51be3d837489ab80a5749835f8a268f180720000000376f35df798576d8b00423111d4764bb9ac0808c6e1e9a2e565552337941c966400000004f8e71e7a423cbdbd714eba3926a832a4133d4c96066fcb8443899275e58509f470a059219704d9151c9de93b1ccc9416a9c63247b7ee87c69bfff9bd50a0d73 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377416298" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 940 xtrqlcxvupobayts.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 940 xtrqlcxvupobayts.exe 940 xtrqlcxvupobayts.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 940 xtrqlcxvupobayts.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 940 xtrqlcxvupobayts.exe 940 xtrqlcxvupobayts.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 940 xtrqlcxvupobayts.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 1884 khyvronkgc.exe 1884 khyvronkgc.exe 1884 khyvronkgc.exe 1884 khyvronkgc.exe 1884 khyvronkgc.exe 1884 khyvronkgc.exe 1884 khyvronkgc.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 852 wrote to memory of 940 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 27 PID 852 wrote to memory of 940 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 27 PID 852 wrote to memory of 940 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 27 PID 852 wrote to memory of 940 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 27 PID 852 wrote to memory of 1644 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 28 PID 852 wrote to memory of 1644 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 28 PID 852 wrote to memory of 1644 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 28 PID 852 wrote to memory of 1644 852 6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe 28 PID 1644 wrote to memory of 1688 1644 iexplore.exe 30 PID 1644 wrote to memory of 1688 1644 iexplore.exe 30 PID 1644 wrote to memory of 1688 1644 iexplore.exe 30 PID 1644 wrote to memory of 1688 1644 iexplore.exe 30 PID 940 wrote to memory of 1928 940 xtrqlcxvupobayts.exe 32 PID 940 wrote to memory of 1928 940 xtrqlcxvupobayts.exe 32 PID 940 wrote to memory of 1928 940 xtrqlcxvupobayts.exe 32 PID 940 wrote to memory of 1928 940 xtrqlcxvupobayts.exe 32 PID 1884 wrote to memory of 1816 1884 khyvronkgc.exe 34 PID 1884 wrote to memory of 1816 1884 khyvronkgc.exe 34 PID 1884 wrote to memory of 1816 1884 khyvronkgc.exe 34 PID 1884 wrote to memory of 1816 1884 khyvronkgc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe"C:\Users\Admin\AppData\Local\Temp\6986dcd77885aff516bbcc9192d06158a92bc3c0909354432d09b39a2c75c42b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Temp\xtrqlcxvupobayts.exeC:\Temp\xtrqlcxvupobayts.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:940 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\khyvronkgc.exe ups_run3⤵
- Executes dropped EXE
PID:1928 -
C:\Temp\khyvronkgc.exeC:\Temp\khyvronkgc.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1816 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:2000
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53361bf002771ce90685637b440775eae
SHA1f5e38434c403c6b67a2265ed33afc72242d86f2f
SHA256e24ecaa9c72bc9974bdc095d597c101770f16f26c03cf4ba0ce39f1e2e3e837d
SHA512f56c2d4d1c45700b11dccf69d546e108663ab56e767d09a1404acbe1d6f257186d92c14c03232fb3cc89572045c567c7c3626ceb6564d39ef439058345f63860
-
Filesize
3KB
MD53361bf002771ce90685637b440775eae
SHA1f5e38434c403c6b67a2265ed33afc72242d86f2f
SHA256e24ecaa9c72bc9974bdc095d597c101770f16f26c03cf4ba0ce39f1e2e3e837d
SHA512f56c2d4d1c45700b11dccf69d546e108663ab56e767d09a1404acbe1d6f257186d92c14c03232fb3cc89572045c567c7c3626ceb6564d39ef439058345f63860
-
Filesize
361KB
MD57052669781b92c5b02ec41dcea52e3ae
SHA190e1ed0d0d118e52fc3698304866121f3c017cc7
SHA25679dde611b57f78b16274d0625c1eee56bf3d6d22537e0eb407ffb08c7a703c7e
SHA5123e190a337550439061a25a139d791b326b40f9b1f17518ba8b987ef83ecbd7377b8296baa30ed0e881b3a3ac8dd3661b0a38109f8ea7b6baf0dc9630f030f2a0
-
Filesize
361KB
MD5c927ce2857cd62863bb1df8eac567e6f
SHA15c2e391cc85bf64fb2d8a2cd23aac78436f71e3a
SHA2564ba0a9c4e6b5ee4b01bf6c3c6c133780b87a62baf55f97bf5918dfcfcebdbedb
SHA5121d5fe352546a3aff304ed76de6ec80f7faf4e90d834bf308a25768dc537daea6fa2184e595306c718f13536e98acc142d7b67777bb8ee69b6011bc296ea86ab1
-
Filesize
361KB
MD5c927ce2857cd62863bb1df8eac567e6f
SHA15c2e391cc85bf64fb2d8a2cd23aac78436f71e3a
SHA2564ba0a9c4e6b5ee4b01bf6c3c6c133780b87a62baf55f97bf5918dfcfcebdbedb
SHA5121d5fe352546a3aff304ed76de6ec80f7faf4e90d834bf308a25768dc537daea6fa2184e595306c718f13536e98acc142d7b67777bb8ee69b6011bc296ea86ab1
-
Filesize
603B
MD593a0613b368bd8bcc1c046af9566e184
SHA1b725172e27faa182027d355ebb333a779e054b95
SHA2562e9d69509d7eb5f547e398b75b831fd5d5fa1bbdb94a307023b114827b326697
SHA512a6b6e62956b55bd1b77a615be76b849c415df70ab2ef9774e689a5457cc2707dcb9053cbfded7bece320ffd6e2f4efd22985c0df9f5434b2e3e3b5714390b554
-
Filesize
3KB
MD53361bf002771ce90685637b440775eae
SHA1f5e38434c403c6b67a2265ed33afc72242d86f2f
SHA256e24ecaa9c72bc9974bdc095d597c101770f16f26c03cf4ba0ce39f1e2e3e837d
SHA512f56c2d4d1c45700b11dccf69d546e108663ab56e767d09a1404acbe1d6f257186d92c14c03232fb3cc89572045c567c7c3626ceb6564d39ef439058345f63860
-
Filesize
3KB
MD53361bf002771ce90685637b440775eae
SHA1f5e38434c403c6b67a2265ed33afc72242d86f2f
SHA256e24ecaa9c72bc9974bdc095d597c101770f16f26c03cf4ba0ce39f1e2e3e837d
SHA512f56c2d4d1c45700b11dccf69d546e108663ab56e767d09a1404acbe1d6f257186d92c14c03232fb3cc89572045c567c7c3626ceb6564d39ef439058345f63860
-
Filesize
3KB
MD53361bf002771ce90685637b440775eae
SHA1f5e38434c403c6b67a2265ed33afc72242d86f2f
SHA256e24ecaa9c72bc9974bdc095d597c101770f16f26c03cf4ba0ce39f1e2e3e837d
SHA512f56c2d4d1c45700b11dccf69d546e108663ab56e767d09a1404acbe1d6f257186d92c14c03232fb3cc89572045c567c7c3626ceb6564d39ef439058345f63860
-
Filesize
3KB
MD53361bf002771ce90685637b440775eae
SHA1f5e38434c403c6b67a2265ed33afc72242d86f2f
SHA256e24ecaa9c72bc9974bdc095d597c101770f16f26c03cf4ba0ce39f1e2e3e837d
SHA512f56c2d4d1c45700b11dccf69d546e108663ab56e767d09a1404acbe1d6f257186d92c14c03232fb3cc89572045c567c7c3626ceb6564d39ef439058345f63860
-
Filesize
361KB
MD5c927ce2857cd62863bb1df8eac567e6f
SHA15c2e391cc85bf64fb2d8a2cd23aac78436f71e3a
SHA2564ba0a9c4e6b5ee4b01bf6c3c6c133780b87a62baf55f97bf5918dfcfcebdbedb
SHA5121d5fe352546a3aff304ed76de6ec80f7faf4e90d834bf308a25768dc537daea6fa2184e595306c718f13536e98acc142d7b67777bb8ee69b6011bc296ea86ab1