Analysis
-
max time kernel
100s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2023 03:15
Static task
static1
Behavioral task
behavioral1
Sample
cdaf2c-DJConcert.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cdaf2c-DJConcert.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
DJConcert.xml
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
DJConcert.xml
Resource
win10v2004-20230220-en
General
-
Target
DJConcert.xml
-
Size
133KB
-
MD5
953222ab6d2eb6b7de89d3b95f74ec77
-
SHA1
f43bbdc1192337e41e60bb6d1fe025addfc2641e
-
SHA256
25c536be4f20b49d27939981abb58280efc1d91d484c75c06a2f908ec60f2642
-
SHA512
7e4bbfd53df4fb671ed0af1f58333e0b176555c4ff02d9a7ee1b4995df386ac1438ad16fd037837d911dd8e1c7906e892a51d1ca8b04d299065ce82033bba1de
-
SSDEEP
384:V86ZYLySueFChASoKXACGPM2Mds6nI0+yzscdARZCfb+Je42:e6ZYL95Z3XPM2i7nI0B3ARa+Je42
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009c9533c410d7fb4fa99336343912513e0000000002000000000010660000000100002000000017df0886542e7484adc466f4750e65259c50cf2b11320f9d1bd8dfa18ae25e4f000000000e8000000002000020000000d746fd207622fd5134b5a661adcf7cbc98d637c92aa761902973d0dd85122b492000000009f491531f9e166520a51c2fcf02f5809a0989f399f88ce9850551a5efd5d5c2400000009db8093f1febbc22e13e252bd4fb27ebdcf4c77a656330aef57b0f678a89cbd8c7cc2c10002061b1468718a7b433e1c14f0188ad0fc9d36e8d22a7e71bb7b6c6 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393391135" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503c0b77a59dd901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F03FDF1-0998-11EE-9C4A-C29BF59226D8} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 432 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 432 IEXPLORE.EXE 432 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1708 wrote to memory of 268 1708 MSOXMLED.EXE 29 PID 1708 wrote to memory of 268 1708 MSOXMLED.EXE 29 PID 1708 wrote to memory of 268 1708 MSOXMLED.EXE 29 PID 1708 wrote to memory of 268 1708 MSOXMLED.EXE 29 PID 268 wrote to memory of 432 268 iexplore.exe 30 PID 268 wrote to memory of 432 268 iexplore.exe 30 PID 268 wrote to memory of 432 268 iexplore.exe 30 PID 268 wrote to memory of 432 268 iexplore.exe 30 PID 432 wrote to memory of 1904 432 IEXPLORE.EXE 31 PID 432 wrote to memory of 1904 432 IEXPLORE.EXE 31 PID 432 wrote to memory of 1904 432 IEXPLORE.EXE 31 PID 432 wrote to memory of 1904 432 IEXPLORE.EXE 31
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\DJConcert.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d626d597ef1071b0b43a279100398d8
SHA1c4d04361df471fccb65ec05250a0d8228496d37c
SHA2565b9faf9d30a0315390d637eb620ed2079315416d5d6d5ad7b88d8ec916ecd2d4
SHA5121a0b6196255073e42b39549e52012aac0c044300711dfd1bc681ee7d57d520c5805a7416b75cbf0f2c57e7853de1bc340c1dac67a58255971cc72825cabc6e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a5adaed4f53fa03b44941f601d55019
SHA10afa4b52ff70fa8fb52fbec00c120a73897f3291
SHA2569d88780c4d1767444e8f92b6d16dbd2d21a0552a0abd934c4601ede390225c6b
SHA5120e05599368f2869803d449137c383200e051941ce26e52a7f545e0dc68d28de59e6776fdc408d39ab4d55198f2d6655f0e01a503cc6239a3a8dc5421f059f5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526e6a7db4bbda4ed72ef190a757f0e8c
SHA1f506e74ed78499eca7c5763a18e6a45f5aec0686
SHA2561b43931df75fb1049019297eb64cb8a6e8772dd4c122aacb4530960fd447f744
SHA5125a4a8698f93148e5907fb679263a46bcd6830d1162588f8273d60a12ede079d36284cf295baf2ba5e4afa30b6cea6b64d00054f6d1e2a5965023660bfb5d33f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c539b6d55f9d636d355a4f98151109b
SHA181d052e21b292a7c7638bd204b3987d037cd7802
SHA25645846f5d9bee81f4bd4efe82584aa6a4c8810aa4b49bfa997f95adf1c97e3303
SHA51267277f34e82ff3ad67bbe0df256bcf5dda23c2a84da723aa2a542d5aed5ec1276e453b153fb0ac6a34853b2cb6a45a2ff396fb6b787d74d943ba532de823fc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa14a70eeacae30763719b53b3888891
SHA1b32205b993b7536186fab38fa765ce48a8487467
SHA25699b7c96ba5a8c30a1b557def268ab020b1f1318a1774deaa27ce62359f996e8c
SHA512354537af90e47af592129371afb59f48875dcd166985630e4d645825747f0fa40e2e4227f3340175b79ab5546a8fb73f69003324e3c66166a719d1548574b456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b96fd63ead760d2d2d14e414d2cdf0e
SHA1e709dc0b91b8506ec974ede289d2cf4496ab48e4
SHA256d0621cabb4d10e34d668966e28f4fd2896e8ce127f59a0d65f3ae4c44dee27ff
SHA5121eb85d887339b158b7fe803543071b2fbaf5398b64af487d9b6c9d531dd304d9b2dc5db59cad5472626f81ac90b2b40db631c34b10d59752aca5c74b6f6c52d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa81a2bcf960e374ec137cb43fcde55e
SHA191110c1bef5ff216011782b47c2cbaa4a3d1fb80
SHA256694dca402a10ae0dbb9fafb57b0f685bfdc97a9800a74de258100cf4b91df260
SHA5120d152cded717f13c3167a41783e8bb09dc40e212ca906f82df8ea3ae41e5b36d72e462d0727ce28da9866d1f670127dc68b0da965d0c84049a50ef1fefc600f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef1f8736f135d58c66c6c37c61cc721c
SHA18434915f4978704a0f8ab155964ab3b9b62e4ec4
SHA2566e3b9c2c98acced36809e5fb6f59a1cd7ecdd9732c3578faa4eac6019bf971c7
SHA51293cb0104ca06c222067623ec65bef35ba9fa5d430fc26924361833dba7ad8e8bf216b89870d60807afa3ead825ccddd19cc5da4ea39e4841abb0199235fe6df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5796f180a6439edb511e724d7984c4353
SHA13d6d2812bde322cb24b8ee7b0355801fce04796e
SHA2562f62dafa9f1a61a3ac38757fccca1a43779bb61ad8e7a4cf120fe6e2b272f2b3
SHA512fbecaee9e1fd0bd53402bca7e675e59d9b825ac9de7af715f56111fec082d532649ce20dc80092584d4d36c1a49c82a4c6ad5b79edd41ddd4e4619610c57f257
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
605B
MD534b6091345c382aa8ea80f15e67afabc
SHA1f601b6522cbf94b5f3a5bd66b70673c342cb6cbb
SHA2565682a4be6a8288dddaed600ebb2f5ba0ac1d00380c162dfb48612c11cd1ef617
SHA512d0b6be3d7fa10dd0815393c88d5a349bdf9c4a84d16727c075ee433a811d865aa5f599158919cba947f7fad9da7e3d5c5de59426d13a63185127724ee8107fcf