Overview
overview
10Static
static
1Setup.exe
windows7-x64
1Setup.exe
windows10-2004-x64
10ccme_ecc.dll
windows7-x64
1ccme_ecc.dll
windows10-2004-x64
1icucnv67.msi
windows7-x64
8icucnv67.msi
windows10-2004-x64
8icudt67.msi
windows7-x64
8icudt67.msi
windows10-2004-x64
8vcomp140.dll
windows7-x64
1vcomp140.dll
windows10-2004-x64
3vcruntime140.dll
windows7-x64
3vcruntime140.dll
windows10-2004-x64
3x86/ACE.dll
windows7-x64
1x86/ACE.dll
windows10-2004-x64
1x86/AGM.dll
windows7-x64
1x86/AGM.dll
windows10-2004-x64
1x86/AIDE.dll
windows7-x64
3x86/AIDE.dll
windows10-2004-x64
3x86/Acroba...OL.dll
windows7-x64
1x86/Acroba...OL.dll
windows10-2004-x64
1x86/Acroba...es.xml
windows7-x64
1x86/Acroba...es.xml
windows10-2004-x64
1x86/Acroba...32.dll
windows7-x64
3x86/Acroba...32.dll
windows10-2004-x64
3x86/AdobeXMP.dll
windows7-x64
3x86/AdobeXMP.dll
windows10-2004-x64
3x86/BIB.dll
windows7-x64
1x86/BIB.dll
windows10-2004-x64
1x86/BIBUtils.dll
windows7-x64
1x86/BIBUtils.dll
windows10-2004-x64
1x86/CoolType.dll
windows7-x64
3x86/CoolType.dll
windows10-2004-x64
3Analysis
-
max time kernel
110s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-02-2023 11:28
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
ccme_ecc.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
ccme_ecc.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
icucnv67.msi
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
icucnv67.msi
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
icudt67.msi
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
icudt67.msi
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
vcomp140.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
vcomp140.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
vcruntime140.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
vcruntime140.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
x86/ACE.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
x86/ACE.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
x86/AGM.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
x86/AGM.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
x86/AIDE.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
x86/AIDE.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
x86/Acrobat/Acrobat32OL.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
x86/Acrobat/Acrobat32OL.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
x86/Acrobat/Adobe.Acrobat.Dependencies.xml
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
x86/Acrobat/Adobe.Acrobat.Dependencies.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
x86/Acrobat/Onix32.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
x86/Acrobat/Onix32.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
x86/AdobeXMP.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
x86/AdobeXMP.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
x86/BIB.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
x86/BIB.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral29
Sample
x86/BIBUtils.dll
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
x86/BIBUtils.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
x86/CoolType.dll
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
x86/CoolType.dll
Resource
win10v2004-20230220-en
General
-
Target
x86/Acrobat/Adobe.Acrobat.Dependencies.xml
-
Size
298B
-
MD5
7bae8b27f113f2c1bdc4181b99117fe9
-
SHA1
541f5fa5fa52885e0068a6b891537f254e334609
-
SHA256
dae02d5688314c66f9001728eeff6010e8af413867dfe4982b6b2c66625d9bb1
-
SHA512
803342e6b91c444128e3fec7e8f64757ec3531e4e4efb5e00a7ae4d7b1fc1cf1d4a42d20b1d986c1a4090567abee79be657983253bd9e8cfdd121a5cbdfc0849
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c0000000002000000000010660000000100002000000054b70118f932804c13ff165a19c74318e414256b573802deb5b35179ceb1beb7000000000e8000000002000020000000d209fedcd69fe97e799a960fc19192d58bb68768917fb1210376b8f93a79882e20000000ec010a6477c92fbcf91c235b6beda00a0a342bd1fb019289c6402a3623a399e740000000b30777f3fb31cf02e0b839f1c1df1ca1118c357bd78e34f5bed431c2eed0d0be25758ec6625bc50b8e6473fdad12689155cf7ecf283f1f938377245b8a429aa3 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50789c05e845d901 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E2DA961-B1DB-11ED-A684-7E8ED113D2E8} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "383744020" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 764 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 764 IEXPLORE.EXE 764 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid process target process PID 1936 wrote to memory of 520 1936 MSOXMLED.EXE iexplore.exe PID 1936 wrote to memory of 520 1936 MSOXMLED.EXE iexplore.exe PID 1936 wrote to memory of 520 1936 MSOXMLED.EXE iexplore.exe PID 1936 wrote to memory of 520 1936 MSOXMLED.EXE iexplore.exe PID 520 wrote to memory of 764 520 iexplore.exe IEXPLORE.EXE PID 520 wrote to memory of 764 520 iexplore.exe IEXPLORE.EXE PID 520 wrote to memory of 764 520 iexplore.exe IEXPLORE.EXE PID 520 wrote to memory of 764 520 iexplore.exe IEXPLORE.EXE PID 764 wrote to memory of 1656 764 IEXPLORE.EXE IEXPLORE.EXE PID 764 wrote to memory of 1656 764 IEXPLORE.EXE IEXPLORE.EXE PID 764 wrote to memory of 1656 764 IEXPLORE.EXE IEXPLORE.EXE PID 764 wrote to memory of 1656 764 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\x86\Acrobat\Adobe.Acrobat.Dependencies.xml"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58d2a7992d859aaed2dd6dac64bb48e3c
SHA1668018293b8373fafb8f6df9b385e388b680ef39
SHA25650bf412478ce46440ea4716b2afdd5afa3eaf29b692349e74142a00e1f5784fc
SHA512cad716901dc31be1699841dfdb45d1ef99b22248df34119666fbeae73645d82b345bdb6d3d3db07e2d9f40387f94388f0e81e14175f435967a1e645cc3bfbe85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53224c6f3fce45fb09a47010744467270
SHA18042a3a69d2149f81923393a184b544a43c20d1b
SHA2569e155bc4da82c0600a5eea4c95465073e4d16a555d61016d9fa1a68c1508ccea
SHA5120d7d3ee04741498e91e71968dac8958c2ab3811b7c6764646474d9ae5dd0a82cad90b81a25bcb675702ce9854a0e56e6d07a8f1f023703a3815fe04ddb58d679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5cebf867b4d1c89d5a86f25663cca478a
SHA1040f78a9e898019fa936897b2f1e29dd40960474
SHA256641b159aa6e28af41c6f5c79f697ec53e711ab1f90e6bb2ed89467dab76e1d0a
SHA512e9d1a47fea830722fc681c322ae2ac3b4d3c7b2efe1035f210138740e7be7c11a7bd63f503a143b8403885bcc5ad10b214a13753169e77d9979a3beff534dc19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD524a2d5c1c7c882f37e6bad09e1c57beb
SHA1d04b27372acb726c235dc78ed0aceb5c5d98d5c0
SHA2564b95a3a5fc180bac4497f140ba882db42940befc7b465021d31321bd1ab7c976
SHA51230722d5ebaa48651a1579ada246d9abab28407b6420a4d4164c74f059d0812e4afd194455ce33310ed940018a7ba4f154cca740720e490fa713de0edb970356e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UIC7WQYE\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\CabF183.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\TarF261.tmpFilesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\83N4GNHQ.txtFilesize
599B
MD5826dd2aa5f48ec8d30fd16d56915af91
SHA1e7128a52bd3eb1de5b29288f5759a932a87afa31
SHA25688868f7b115775389d7f7597efec9c06384b281f3ca48516be3e2b2844d2ec1b
SHA512b21b6d9596e4bc7cb3309e660eb7a5db7a98836b5c0f8ee939e8cc8db32c956acd39ba585c74e3bb57aa40a900230a5420bc2b1577f9bbf36a734a0ecd296e73
-
memory/764-54-0x00000000026B0000-0x00000000026C0000-memory.dmpFilesize
64KB
-
memory/1656-55-0x00000000022F0000-0x00000000022F2000-memory.dmpFilesize
8KB