Resubmissions
09/05/2023, 18:41
230509-xbr8tadd33 109/05/2023, 18:40
230509-xbcs5add29 109/05/2023, 18:22
230509-wzwepsfc4v 809/05/2023, 18:18
230509-wxq27sdc58 109/05/2023, 18:14
230509-wvfhpadc47 6Analysis
-
max time kernel
101s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2023, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
pete.svg
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
pete.svg
Resource
win10v2004-20230220-en
General
-
Target
pete.svg
-
Size
13KB
-
MD5
41e8b14ea397af921e8c0c7856324f7b
-
SHA1
af831d8dab0472e5b9275b19b464002f879a9399
-
SHA256
a2cb0e7359dfc56f8b8e043d20383c60867f0dcfb808cca56318a1a36d3f8d66
-
SHA512
1536da8cb02c917065cc538318a36bed80b782fc51ffa2ed1e3a563b4fda5ed0c31290c6b92efd30ad275aa14e3666ec208288eadbae770d0a61aa9aa5d18854
-
SSDEEP
384:LKuyWu/uK2BlW5P2Zu0zyignTeNS1YlPPC3BTpDH:LKubu/uK2BlWjoSSlnCRTpz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a00000000020000000000106600000001000020000000054e8adc281262cd36ddcd7e690e43cd79e53cc526e40925b1873e6be9a3128c000000000e8000000002000020000000b8cb7f53b08163cd44736aa2b501cbddda7e9324ecb35daa86cca27649abbcf320000000c3a577d406675cc6408474603512c088380c18d4395d237831710e01d3b7919440000000c8559ba131366cadd85b4912d7da08d24878dcd24a30e20ff6c4631fcb561cb7473e5125fcfe29e975879a76bc38e8a0451d21103fb38436783707b0cb2c6c86 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "390429850" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7AFA691-EEA9-11ED-A29E-C6F40EA7D53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e988adb682d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1104 iexplore.exe 1104 iexplore.exe 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1316 1104 iexplore.exe 29 PID 1104 wrote to memory of 1316 1104 iexplore.exe 29 PID 1104 wrote to memory of 1316 1104 iexplore.exe 29 PID 1104 wrote to memory of 1316 1104 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\pete.svg1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5494e5e01b82a53204892ab44f1878728
SHA13bc35c97901b0299fa618da13abbaefc68236c6c
SHA25673e0104a996b24cc113f740726c1713d85276c1f9433e9a15cc6f0ed169cfc55
SHA5122760951ced661e33d925ebe9915c028f635ebc36c15101960e6637a59efb775dfb4a0400484dc171783edfa72935a72b47f5520ba4fdda6fa8da0c5d3d12080b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51242f365f5a47dd0948bef17229cc466
SHA1c1e8cce70066ad981a02e83007c6d206e926b9c7
SHA256f980c4d3438265f25b5972f227bf426722a7dec431853b509dd7851bcb5de4d3
SHA51263a312032b4af5299bf7e2dccb02deba3c6703eedfde1e690f3d3c53878c0812fbbe738cf8c60467f8cc0407a4812ca7b9ad27551d40578a4677dcabe39c3f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51c16dbc103a68b6879864dde36f1fe3c
SHA1608f7f435a729e4f13046711a26cc8266057c370
SHA256d1f3d96b0ff840d45903e385f000adec435672933f2f0820f7fa5ee2b90bafaa
SHA512f094a79e2b92cfd589789c73981e28cd32e3b269d0a3f8fe076e5d13f1dae9cc450457ea70288c9b811492dd36b2f4b0ddda5a96326187ba8ddf6942faefeea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55b658141f63e07414de371fdbd00924b
SHA116f2e4733cd0d78d80dc0b8e2a66c8f2c7c28a2d
SHA2567d4ffa120c355953313e3daa42422ef7e5a2fb9497229b19b0c5d8814d89bc3a
SHA5123c496d2747edc64699e401d1670e2ee77e02580a56b356837260828711350588b7971db5a64725fbf773de0fbcb73c732202feb559e1590bf739fb77eb87dd22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD572593aeb8e236e0f7eebc73f65b16842
SHA1b0f4fe212d5749df16553eb518b31ad585452373
SHA25662b28d41e837bedeeacfc2e369b9c35dd26e37e4ff65f5ee9c1d8fe494cc8ffe
SHA512a090502b0c3eecc03c972de545a19b5b44200764961b00a92721612662d1679283a808a9ed501f5c663fa41e6a296226bd9a26a888b067666ece8121c191cb10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5138f028ee8f698bea637bc435e0d829b
SHA132e78806bee900747a299d6ee689756f363d2405
SHA256d7e3a4bd1e32862a26d47b07829b526758c6dd2f7331bada121747e8a0867b5f
SHA512caed73965759ad0c8987d6fa2e78a3c9cf6f6ee309f52cd8b1e55eb4e0d6020dce457c1aba3c24fdbbb7d25ab4af04ccb08cecd45f081aa0fa384faa8b0786f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e538761d25d52c37fb663726bfd70205
SHA1da246ff4546f06d8ecfdd3ec2b6ebc3a8682c096
SHA2560f9d9079f1ddd713735083da6ef484fc20317665a52a9c74ec499810bd2c9022
SHA51266db7dc1fb9be42b1f4731cde151878c9a0762219800cd021de716d9448301b252204e55bf130e36f37639069dd4a8d58b3a3a110ca543a03dcc5bcf50624554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58026746b41d18b3c0142f5cbc320c92a
SHA19c9e6458734ac9141ce9d11bb508f15a1db28e23
SHA256030663a408175d827542c87bfbf71dc44507c9ee3790311ff663db9f7c10c61e
SHA5124abcc720f26387b6ff47eed22094c74e74cf1d68bf52694b331a19fe6c4b07a9e5311ed22e671e68588d8ea56761e447eeee5cdec418d4ffe88b8fab5752d2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a7e4c976a62427909500651b2c762baa
SHA152d45b043c992bf4dece57a165e05dab798cebc5
SHA2568fd84b94b763ebd1f0cdf07b5493ec166808054bb51661684525c74500545426
SHA5120051dfac1636cb6e3a7fffa5a6084e696c04314b56694af429630974f664ef08e7c8ef527adbccdcdf2cb81af475afb3914c4ff1a42cd72a8b335a5df68aefc5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
600B
MD51844be06397c36c9da49d12870e4f984
SHA114366559d8eddd1807d30d41ff81ebc9492bd086
SHA25607273e3dc23fc4d9e744ca6071d39db313fb79e116909668377af9622ffac9d0
SHA5127817b1511a03009fdd976a68afaf64868abb9af84422bfbab63f77108e78b5c970f213256d23dc3fc252f92479a3d7f0ecd366a140035aa23a5670722f6fb628