Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe
Resource
win10v2004-20221111-en
General
-
Target
923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe
-
Size
240KB
-
MD5
7d665965ddaf263a6d8256ff70745e8a
-
SHA1
6a20c5ae5bc01e92dc18e645e5a92fb739437e32
-
SHA256
923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666
-
SHA512
366143229f2e8770a5b40c89ee534d40e0c1b4d0f21c6f98fe950b590eb1add0077a0a3484cb18d376f4f8f0a7ccfbb5c95fa9759dc871c8fc7ae8265cc96e15
-
SSDEEP
3072:jDN7LCCyS2ZzVokNTGUAuIvDpqDpsiNJkQ4kCLQ619M61D5WEz2Xp:ryS2ZzVzNSU9IUDGizikcPD5WEz2
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Uttstm = "C:\\Users\\Admin\\AppData\\Roaming\\Uttstm.exe" iexplore.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2432 set thread context of 1356 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 83 PID 1356 set thread context of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9A66F2E4-7924-11ED-BF5F-FAE5CAF4041A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377508383" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 684 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 684 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 684 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 684 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe Token: SeDebugPrivilege 2536 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 176 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 176 IEXPLORE.EXE 176 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1356 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 83 PID 2432 wrote to memory of 1356 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 83 PID 2432 wrote to memory of 1356 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 83 PID 2432 wrote to memory of 1356 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 83 PID 2432 wrote to memory of 1356 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 83 PID 2432 wrote to memory of 1356 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 83 PID 2432 wrote to memory of 1356 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 83 PID 2432 wrote to memory of 1356 2432 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 83 PID 1356 wrote to memory of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 PID 1356 wrote to memory of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 PID 1356 wrote to memory of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 PID 1356 wrote to memory of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 PID 1356 wrote to memory of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 PID 1356 wrote to memory of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 PID 1356 wrote to memory of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 PID 1356 wrote to memory of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 PID 1356 wrote to memory of 684 1356 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 84 PID 684 wrote to memory of 2536 684 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 86 PID 684 wrote to memory of 2536 684 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 86 PID 684 wrote to memory of 2536 684 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 86 PID 2536 wrote to memory of 176 2536 iexplore.exe 87 PID 2536 wrote to memory of 176 2536 iexplore.exe 87 PID 684 wrote to memory of 2536 684 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 86 PID 684 wrote to memory of 2536 684 923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe 86 PID 176 wrote to memory of 1544 176 IEXPLORE.EXE 88 PID 176 wrote to memory of 1544 176 IEXPLORE.EXE 88 PID 176 wrote to memory of 1544 176 IEXPLORE.EXE 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe"C:\Users\Admin\AppData\Local\Temp\923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe"C:\Users\Admin\AppData\Local\Temp\923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe"C:\Users\Admin\AppData\Local\Temp\923a30bdef24cbfbfd9fc08ab30f3f01e3dc980ef7db1906abfc81b9b45c3666.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:176 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
-
-
-