Analysis
-
max time kernel
94s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 13:02
Behavioral task
behavioral1
Sample
9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe
Resource
win10v2004-20221111-en
General
-
Target
9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe
-
Size
377KB
-
MD5
35909d898b101103e524f8c1c3c49c00
-
SHA1
38e0c2400bd6df41e39cf02f6e7f5a268b8a3bb8
-
SHA256
9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5
-
SHA512
eeb8f155854f3520632b570ebc386bec85041fbea40c223d332e7517dc381fbf83f7783d65dc2bead46984d1911df851edd0c196a78bc8f88bd2baaae72b1e9d
-
SSDEEP
3072:0rSFhxp7xHSc7qzPKb/0at9ayXAVJlz0rpl:1hxFxy8qeb/9zaw+zyp
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1096-54-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1096-55-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1714811-9FDD-11ED-B51C-6E705F4A26E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1716F21-9FDD-11ED-B51C-6E705F4A26E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "381765975" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exepid process 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exedescription pid process Token: SeDebugPrivilege 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeiexplore.exepid process 1472 iexplore.exe 1324 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1324 iexplore.exe 1472 iexplore.exe 1324 iexplore.exe 1472 iexplore.exe 1708 IEXPLORE.EXE 672 IEXPLORE.EXE 1708 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exeiexplore.exeiexplore.exedescription pid process target process PID 1096 wrote to memory of 1472 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe iexplore.exe PID 1096 wrote to memory of 1472 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe iexplore.exe PID 1096 wrote to memory of 1472 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe iexplore.exe PID 1096 wrote to memory of 1472 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe iexplore.exe PID 1096 wrote to memory of 1324 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe iexplore.exe PID 1096 wrote to memory of 1324 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe iexplore.exe PID 1096 wrote to memory of 1324 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe iexplore.exe PID 1096 wrote to memory of 1324 1096 9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe iexplore.exe PID 1472 wrote to memory of 672 1472 iexplore.exe IEXPLORE.EXE PID 1324 wrote to memory of 1708 1324 iexplore.exe IEXPLORE.EXE PID 1324 wrote to memory of 1708 1324 iexplore.exe IEXPLORE.EXE PID 1324 wrote to memory of 1708 1324 iexplore.exe IEXPLORE.EXE PID 1472 wrote to memory of 672 1472 iexplore.exe IEXPLORE.EXE PID 1324 wrote to memory of 1708 1324 iexplore.exe IEXPLORE.EXE PID 1472 wrote to memory of 672 1472 iexplore.exe IEXPLORE.EXE PID 1472 wrote to memory of 672 1472 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe"C:\Users\Admin\AppData\Local\Temp\9c5819671476955d81b58da0075be6eaa8e69af4d0345a0d0b7b63e132185bd5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1472 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A1714811-9FDD-11ED-B51C-6E705F4A26E5}.datFilesize
4KB
MD593cbd4d91964ad29ba9fe85f4c9fe913
SHA148018261e7d634968a3e13d601d49bf33d7598c6
SHA256378e263bae663ba6b7d1a59b13780dcd8676e52b73b2ee33b235b8686023d564
SHA51242ef0628601c86a823f031841a17900d6373a86e11753375811888fad5be2cf480073786ec8d126314029b2319f9dd166d08945251fdabf4765873d35a51190e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A1716F21-9FDD-11ED-B51C-6E705F4A26E5}.datFilesize
3KB
MD533b26e30a75b3e272ded6cd1eecf64dc
SHA1fd89ccf7e3ff84c42fc533f9f6b5f6e1fe99b19e
SHA25670b752bb0f8bfe7e2756351c6fd5f237c114145a2283f63f98d2b5405b57cf7b
SHA51265fca76f02e872d6867133cac0380d728550287ccdb5411ab308f343200cdca64591da143b705c34f7be76c1dccf9174ce311fafa335b8b36c1ef022d83464f1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I7FYXFPY.txtFilesize
606B
MD5a8c0d37e635ec68b60099363e3b39e62
SHA1882300bc40eeb0d5673f0d645165f5e6e589c69d
SHA256ba153d3d9ea8dac7fae23fea635d5f3fbb10f20ed6054e446274ad43cd998143
SHA5121258720f78b632dab421487a5938c87e981e3672637a9e2c4db43ae12852a9a70a815156bae056d203b7927dab10a945591699a87372552b246d7b84aba43d06
-
memory/1096-54-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/1096-55-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB