Analysis
-
max time kernel
149s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2023 19:57
Behavioral task
behavioral1
Sample
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe
Resource
win10v2004-20230220-en
General
-
Target
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe
-
Size
1.8MB
-
MD5
9dd5b1cbcaa2fff8e5ce21b296b2efa0
-
SHA1
295a9195b93f02bed7bf5146c34430c63bc7f117
-
SHA256
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f
-
SHA512
9c71dbf5551d1e6b3bab5a4139496800135bde4b89d7bcfa55d0241756d1ee70e5c04efebdaaed63ebb298fe9d2d1cffd232d566223ec7db910ddb9d680fb9c4
-
SSDEEP
49152:8AyMNnEcPaMkDpavau4Bo5YQm/zRWy1E0X3:JnCMkNxlv3VWqn3
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1704 cmd.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 34 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7400310000000000545615b71100557365727300600008000400efbeee3a851a545615b72a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a00310000000000c9562c9f102054656d700000360008000400efbe545615b7c9562c9f2a00000001020000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c00310000000000545677b910204c6f63616c00380008000400efbe545615b7545677b92a000000000200000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 5200310000000000545615b7122041707044617461003c0008000400efbe545615b7545615b72a000000ed0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000005456f1bd100041646d696e00380008000400efbe545615b75456f1bd2a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exepid process 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exedescription pid process Token: SeDebugPrivilege 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exepid process 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exepid process 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exeexplorer.exepid process 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe 632 explorer.exe 632 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.execmd.exedescription pid process target process PID 760 wrote to memory of 560 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 560 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 560 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 560 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 2012 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 2012 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 2012 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 2012 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1104 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1104 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1104 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1104 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1624 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1624 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1624 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1624 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1704 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1704 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1704 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 760 wrote to memory of 1704 760 f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe cmd.exe PID 1704 wrote to memory of 1688 1704 cmd.exe explorer.exe PID 1704 wrote to memory of 1688 1704 cmd.exe explorer.exe PID 1704 wrote to memory of 1688 1704 cmd.exe explorer.exe PID 1704 wrote to memory of 1688 1704 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe"C:\Users\Admin\AppData\Local\Temp\f7ab2b56a9f3d715c10272bed2f26d5ce12530d2a6391d67912e37113f36379f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*¸ßÊý¿Î¼þ*.exe" /F /A /Q2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*ÈÎÕý·Ç*.mp4" /F /A /Q2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*¸ßµÈÊýѧ*.mp4" /F /A /Q2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\Ö÷³ÌÐò*.exe" /F /A /Q2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\6c1dceOl2O.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp3⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6c1dceOl2O.batFilesize
352B
MD5aa9e5901132d1f84efc3ab39c20a69c3
SHA194a10bebb5cb8ea1617025225af477a96dbc4da5
SHA256eefd8f9d5558efdd3daee5e8731e65592792447423013162ff0836a9918b42ef
SHA5120e21a4fae6bd474331239f8405a5507836108f0a477e11e3bbd2da20ab1fc72cfd963a818dddae2eeba8d29fdf02d36d4bab0f8280a0397e499b1deaca5fa9e7
-
C:\Users\Admin\AppData\Local\Temp\6c1dceOl2O.batFilesize
352B
MD5aa9e5901132d1f84efc3ab39c20a69c3
SHA194a10bebb5cb8ea1617025225af477a96dbc4da5
SHA256eefd8f9d5558efdd3daee5e8731e65592792447423013162ff0836a9918b42ef
SHA5120e21a4fae6bd474331239f8405a5507836108f0a477e11e3bbd2da20ab1fc72cfd963a818dddae2eeba8d29fdf02d36d4bab0f8280a0397e499b1deaca5fa9e7
-
memory/632-118-0x0000000003730000-0x0000000003731000-memory.dmpFilesize
4KB
-
memory/632-117-0x0000000003740000-0x0000000003750000-memory.dmpFilesize
64KB
-
memory/760-87-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-89-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-67-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-69-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-71-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-73-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-77-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-75-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-79-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-81-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-83-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-85-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-56-0x0000000001270000-0x0000000001611000-memory.dmpFilesize
3.6MB
-
memory/760-65-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-91-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-93-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-95-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-97-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-100-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-102-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/760-103-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-105-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-107-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-61-0x0000000010000000-0x0000000010051000-memory.dmpFilesize
324KB
-
memory/760-57-0x0000000001270000-0x0000000001611000-memory.dmpFilesize
3.6MB
-
memory/760-115-0x0000000001270000-0x0000000001611000-memory.dmpFilesize
3.6MB
-
memory/760-54-0x0000000001270000-0x0000000001611000-memory.dmpFilesize
3.6MB
-
memory/760-55-0x0000000001270000-0x0000000001611000-memory.dmpFilesize
3.6MB