Analysis
-
max time kernel
102s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
build_3.xml
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
build_3.xml
Resource
win10v2004-20230220-en
General
-
Target
build_3.xml
-
Size
298B
-
MD5
3861a3795095fe81fcb8382d2b9066bd
-
SHA1
2cef2af9a35d636c3af48902c20891ec49a8e791
-
SHA256
b19463cb9b847bdfc7dbf8133d9702d0a0ecc4175335c4a75db211e0196f84b3
-
SHA512
8e881d7f7a8236d36aef500473a3dbc5a98d46c1596d33ab76e4669f858d86c6b4881c0882c37d2d32b888fcaf6280385932ca5ffc6a5143d625c71b8fc8b294
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "390059744" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EEF1BF1-EB4C-11ED-B936-C29BF59226D8} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f35fd4ec1ca1494aa57fdd0dc6b810a400000000020000000000106600000001000020000000a8ed2f03edff7addb08f0481f07757a05c0ec80494fca167cc74874aac42e703000000000e8000000002000020000000baaf69470c8ffb9764188d2a4054b795919341279a3f10b6fc086506687b3623200000003ee0b3ba74b46d95a1dc8a230531ceb76950e18627351a859d54bbb47eb665734000000082871a93f57a9f0317dd2a17540e41eb73160549a98e0358a01c06348e3cb82ddc53c008f7d91444ead091265fb186080547bc83f22c349a1af5f7fcce34782c IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6088c2fb587fd901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 320 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 320 IEXPLORE.EXE 320 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2024 wrote to memory of 268 2024 MSOXMLED.EXE 28 PID 2024 wrote to memory of 268 2024 MSOXMLED.EXE 28 PID 2024 wrote to memory of 268 2024 MSOXMLED.EXE 28 PID 2024 wrote to memory of 268 2024 MSOXMLED.EXE 28 PID 268 wrote to memory of 320 268 iexplore.exe 29 PID 268 wrote to memory of 320 268 iexplore.exe 29 PID 268 wrote to memory of 320 268 iexplore.exe 29 PID 268 wrote to memory of 320 268 iexplore.exe 29 PID 320 wrote to memory of 1956 320 IEXPLORE.EXE 30 PID 320 wrote to memory of 1956 320 IEXPLORE.EXE 30 PID 320 wrote to memory of 1956 320 IEXPLORE.EXE 30 PID 320 wrote to memory of 1956 320 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\build_3.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542cc9ecb5d013ebd81e482716f63d3ea
SHA1030befcd3a2430a87d15633e38b124d860ec7992
SHA256e3f97dd7a6782eef7f491094c4bcc248b3c475f40a61c48c5a700702662d3c26
SHA512208cfdd1b929e8dfa434112313acadb7ec98fb67693ff07008b654a75e46cee43596e7b7601208a1fc7d2facf67bb96027e891d8b65dc4a7f399d754905b6e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f76d6bb070e965044420466778d3abe
SHA1bf919282d77dc6f494593c24075fc98c06d4fdbb
SHA25676dee894b7ff319e605ccef7d05c253a73aaec425e435f42491b5394aee041c7
SHA512584a0d86d57b286b5d3b332320f37d1990e02ab8da1087d81db07a06bcf7729feb0ca44c859bc13d496b5c9c7a0da8443bf08266017d62c3695978820ad810d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5464a800a4f29e9ec2e8d84afc3375e49
SHA1f91fc8a9ede41c99f6f0d129a663a44b0dccbd7b
SHA256b1896588807f8b988c0b3d43f2d360ef524386c760d6da345d4409ed79b68441
SHA512b2be1adb402943917f9bf8bb9d6409a4e23d9cbd7cf95f2188977b5f45dc45387cc2726b2c595f78992485ce3184c4451c72edd2e2b502043b23a2b9e87b2f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f65013bbbf5930e7f41829ef3b13756f
SHA167756886fa81ab5547c8bee1e248dbbb046a3321
SHA25653a0b6dc0a2f29e0c258d1465febc6f164fa85c172628018449ebeb7ceba15b2
SHA5123b48a4092fe5d2ca42ca1addb3bda62ec947ca90c04d7f07ba237f078f3b5b07f7f1587aa49f858d3a4129ae821609c00367980e5633e615c4fabef33b02298f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7988b279a576502a1202c96b83ae56f
SHA1e063cb1398a7591be6d346be4d42e79369be04fd
SHA256010cb88ec4f66afd53d91badd5a2cec704f654bb7323914d4011db6daf6907ff
SHA5125089b6a380a221a6c8844c351043e2e9a4d7416046a1f4f947147fce6193da71a52d6d7049964cec99ad9be234762b790562959881cc5c8193b4d5a31d5dd1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7d6324cd01fe91527f8c5ea45701039
SHA1c660212133aada504750c68db6a9cf9394c499ab
SHA25612e1a8897abe28e9d97d184d5b9143ebb3ca8484f443004aeecd19399547240d
SHA512280ed2ef057584e7c4bdb18fc01bd0d7cb557a9119acb4e3cbb725509915b03151d8425ee5eeeb3e835e9b22f7920c444b82d92baf47443807a8cc5e08c61e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584076f85779ed77bea86e60655219819
SHA11b1d7e58114fe07f87d4a26e69ad2d72fa5e810c
SHA25661f06ca72d26c390b0b6ae3d3c98e00e79f0a0be1905bfbc39f04d4899efd45e
SHA512bdd37d984c16311f64fbf7ddfecc674b07acbaef73868ba0ef43ced271f38f6f2d2b80d46712db48d70cb43414d1fe60aed0b1f5b73d3eda108ebc6bb0271c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5751276e4283164c9963e2e1cf8823cde
SHA149173c60857d381758ebef43fa982dc8bc932a6b
SHA256e86dbd5287fb07ef8d47dfbf9a08b240c548d4c2181e372aa55a508518dc12d7
SHA5120144fc5ffa4c3eabbba4e200b1db3491d2db9e5f835647f7ad513690030c6f6f709d104f604cab8da7cf66f89df57653f63e13aa29f0ebc5211de010cd50db1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9daae067b0c4ab619e9ede11b9e9b2e
SHA15ca29157e5be9617c1eb503d299d9884051ef2d0
SHA256d103666902ad7ee932e11e2911ce5f06897b030d5dfce0d7fab320f27644ec41
SHA5126ad791398ce2f83e5cf3b428146cf046b1c160ae13866d973040bec963b6445c5c8f692ee9cc1b225168a89c876543ae0bd99586dd949d4fd1e277ecf6189f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5400dff3734aff1b1e171315e02fda3d6
SHA18c526168f12da3b535d8137c05703ecdd6b55516
SHA2562233d96cea73b77d3be6a62df0df9fb0549d87d7f9bf9c7cd95cfacdbeebab8f
SHA5124b07901c0145962711c9e9652bf1fbfaa7bac62acb919113405b78c825d1219788c06739a82502855b36472e9ee3521f0ca84f7eb64be8623063f08559684a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5262a1ad36660bdbc4e20d593eafc13b3
SHA1ddf004b5397914fc30acbadf087f00c7b4273af9
SHA256a5dddc4937036d787430df8d113289cf78e8d0ae71ba4d0e4ea56bebef75e588
SHA512be5e2d627c6b520eb8bf2660653d2edfecbbfcc97f6ea8bb3547a19cca69ece1f7a10bcb736a3ccd319aac900c1b777a4a3b12a1711f7e614e31da7f7c2206f3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BYN4WSI\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
603B
MD53432bb5e112512fa906b9f6474f54de2
SHA1d16338fafa90dec068ba1b430157f5abaddd2120
SHA25642587fe009e1a2d9d3cd36ebc4d8f1d8fa654bd470bae4b65bfb92a44a87908e
SHA5122c478b544f62d1da4408d58cfc7e6201d817c85426758967539c27030016b13bb18044490755e5dc2a5666dc24616c56b7cce98a0c5e90d525acc1c3389a0dab