Analysis
-
max time kernel
100s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2023 16:51
Behavioral task
behavioral1
Sample
Aws.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Aws.exe
Resource
win10v2004-20230221-en
General
-
Target
Aws.exe
-
Size
717KB
-
MD5
8f903f5e72c2e75be929ba9387eca6e0
-
SHA1
35f72f4c3cd30b4edcbefdcfa1e6eb4005c9dbab
-
SHA256
507462d586444bb57dfc8a7962a018c30891855e1187f79472eb87bacd346389
-
SHA512
ce8c33dda613d79ecdcb2e8483f541deeb6d6e57f070ab128600369bf506c2c466385a015ce8b2d3209e5b470edf6b604cfed3fd99efe5ac5b5b42aa38b524ce
-
SSDEEP
12288:EAjq4FpXdEQVyDLYRx1DOkl4vF4iPlAVrV2nc9dnbPk41C5DJsJNQ:7+mXmtLYRKkI4ilAV0nIRbkhJ3
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Aws.exedescription ioc process File opened (read-only) \??\p: Aws.exe File opened (read-only) \??\s: Aws.exe File opened (read-only) \??\x: Aws.exe File opened (read-only) \??\y: Aws.exe File opened (read-only) \??\h: Aws.exe File opened (read-only) \??\l: Aws.exe File opened (read-only) \??\q: Aws.exe File opened (read-only) \??\w: Aws.exe File opened (read-only) \??\u: Aws.exe File opened (read-only) \??\v: Aws.exe File opened (read-only) \??\b: Aws.exe File opened (read-only) \??\k: Aws.exe File opened (read-only) \??\n: Aws.exe File opened (read-only) \??\r: Aws.exe File opened (read-only) \??\i: Aws.exe File opened (read-only) \??\j: Aws.exe File opened (read-only) \??\m: Aws.exe File opened (read-only) \??\o: Aws.exe File opened (read-only) \??\a: Aws.exe File opened (read-only) \??\e: Aws.exe File opened (read-only) \??\f: Aws.exe File opened (read-only) \??\g: Aws.exe File opened (read-only) \??\t: Aws.exe File opened (read-only) \??\z: Aws.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Aws.exedescription ioc process File opened for modification \??\PhysicalDrive0 Aws.exe -
Drops file in Windows directory 1 IoCs
Processes:
Aws.exedescription ioc process File opened for modification C:\Windows\Aws.ini Aws.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051d3597677851a46a2386a7092f6bcf300000000020000000000106600000001000020000000a498b2fda33e48d45bfcdf00cb4b3e4efb3eb1331d6c39e6431bf032b49dd8b1000000000e80000000020000200000003cb2ef5205e6233a290cabcd58f52a56cad8162b9ba2f6d42fca23d4ce8f2cd120000000d0b84bc300cce49512d5d70554a865c10f7ee3b0df79ec431577385c713dc94d40000000a013c9c7096cbd778ab28af4cafa89e6eae741f2a0f0f398e76f1b6fe8f188876b7f029620113e1802ac26a6dc94dd4de9b757dc866f95c92760c19f046bbfcf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A17A4681-0A0A-11EE-AD83-6AEE4B25B7A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803be67c179ed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393440102" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051d3597677851a46a2386a7092f6bcf300000000020000000000106600000001000020000000b84094c46c4b3adc1ba9868ceab0967a7ef0e014c13a09b666d3b1f87c49d6f9000000000e80000000020000200000005d8c79d2edb57579d9601bae7c5322ba90cbbfcc088f1c4034169658ea71d72990000000f979cf8c159328b37bea9a551945d9a12731e5e549ee479495699fd4b958d5c3d6761eab97e3bc1931216ed0dc36bfa9e50d858e905c9bec511846d3d492df60a05156ca61b1fef97de1423e1cac6843c7373caeb457138954fead8a0f64b9dc39fa796f4fd627c55235ca9f9f3a6ab065c4788e8270a58f2d59d803a422e44981f5365dd6be63e76318572ef8c95ab7400000003cdce603bca16ea81799a1c6c79334e81156f48cfd53676436553f952371e54171b5e4d140fb560561f35931a9a814f194c2af713d8830219d4b22469259f6b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Aws.exepid process 272 Aws.exe 272 Aws.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Aws.exeiexplore.exepid process 272 Aws.exe 972 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Aws.exepid process 272 Aws.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
Aws.exeiexplore.exeIEXPLORE.EXEpid process 272 Aws.exe 272 Aws.exe 272 Aws.exe 272 Aws.exe 272 Aws.exe 272 Aws.exe 272 Aws.exe 972 iexplore.exe 972 iexplore.exe 752 IEXPLORE.EXE 752 IEXPLORE.EXE 752 IEXPLORE.EXE 752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Aws.exeiexplore.exedescription pid process target process PID 272 wrote to memory of 972 272 Aws.exe iexplore.exe PID 272 wrote to memory of 972 272 Aws.exe iexplore.exe PID 272 wrote to memory of 972 272 Aws.exe iexplore.exe PID 272 wrote to memory of 972 272 Aws.exe iexplore.exe PID 972 wrote to memory of 752 972 iexplore.exe IEXPLORE.EXE PID 972 wrote to memory of 752 972 iexplore.exe IEXPLORE.EXE PID 972 wrote to memory of 752 972 iexplore.exe IEXPLORE.EXE PID 972 wrote to memory of 752 972 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aws.exe"C:\Users\Admin\AppData\Local\Temp\Aws.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:272 -
\??\c:\program files\internet explorer\iexplore.exe"c:\program files\internet explorer\iexplore.exe" Http://10.127.0.83:80/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:972 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558553f88ae28b15a758eee6829c1edea
SHA1b2d2bd5652ef472ffdeb2584dd2fc4b509c58a0e
SHA2565356fdb574561c47a5a2408116a846894f03c6d04d478699cc32fe681c0635bb
SHA5124ef0fad36d0c2116f90bf8ee0d0431f0dbaa6e3b5789a0a1beeece7441f23c8e83efe9bf07ce746bcbca7de3bf7fef10efec2f42de4cc4c28b08f8d0e3f4be49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573ee64933bca3246040385844d11e4d7
SHA110e4a90e74d4d35219fc7e9f4bf899c6ac61cf6d
SHA25671889b2067e8b0840b6b1db94ed497affd3d762eb16371f015f2a4a0463804bd
SHA512c0ab94b97b526289d1779dc638d66e0f52454ff262ba82e7c0c8c398f7969bb3b96fe2066625cb81a9b191de0f442ba736eb8bd0ceb00be4a965d9b525460451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5264177dc62d7aff7bfed76dba3771ff4
SHA14c05e4b9ab62649c577e04547478ca68c0d9a689
SHA25611ee7171eda73ae3c7616581d1b589fd8f2be67a078cd03e4035dcc1e5350e7d
SHA512d76990ec8df0a339d669312e8bed51d0058a21db2d7e6f75006722aa87f8a840d6983ae8fc886ee2da9f52d788f53bbe6e6cfffd1ff1da08d892382461c8ace6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e913b57515a559bb86f1dafad97e101
SHA15ad4866601c3ebe61913b53df3c7fcf454eedadb
SHA25633801447c79451eb3ceecf94e8e84fa2e1131f17a4a4e95d2b1109aaee60cea1
SHA512c50f237b7aab8feb5d4062cbb4911a5a023b036cb219f005e0eeec7960770e058ea592ee52d05a9c95895c71de3086108330110917b93db731c516cf0c2b1a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a968896f86fa159a0488eadd97f9315
SHA17c7c2160bf44f8444597864eb05f566e91df8523
SHA256b1cf7a80796d33c8a91757613e9b74d7166e159faeb9a95dda68a8a2d3dd77ad
SHA512ca6864146f2fe8043c19d4cdff3bbb29282bae451abef18706291e1605c7962db39014dc37dca7307c355d2ad3bbf6d7d4a6a8106a8e2670a87f19f998c78431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e66c94eceec41ee0774de12877e424b6
SHA1b8e510927a1ef1eeba098f7c3e302588ae7980b5
SHA25615171a1ba2fe4494a55c3b0e8eaf70d8cf35ce995339dfb3db12f4acf8a0c5ef
SHA5128fb26610297944a0506f520bdbcc8d49b05819b88b7fcea556446cafb6385f981a92018a7f6a07432ebcd5255a5270a244c0c6cf2e011bbbd4bbddadfa3db35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55546e6e1f283254c448ea15792a36cb7
SHA1d4b4bb5bf860f5c90a605d0943090766f79b1f5c
SHA256aeffc321e0185528733635b6346012c238792e427d4dcfb125ce3d9932b66644
SHA5126439d6e25efb7b7292107780954cd615c84a8de38e709a8d9f3c26cbe69a52137bd37bd8c891ca90312f9bc8502130f498fd4ebfc3e9146d4e620634b01052d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3378070e22a9195f53c2ea5bdd1e31d
SHA1ce5d147aa04ba09e31947233235f66d8f5688e3b
SHA25687ea92c38f11d6663977ebefba1da46d2b265413b51d1276cdd791abb93856c6
SHA5121e59f1b4f4aeaeb27c48a6243835ac110f892833ac8fd3f43585fe6032a9c25940102a1f53c554079f8caf625955950e4b48d8597aa4dc6d7d5f15047625c552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518eb4d8d4a97aed6a465742bbd8e4e3b
SHA1df94c19194f8782a7cbf332c70824937aaa65b23
SHA256ca6b80e8e0a112bc0cfd99cd87796b6fe94d45d47ae692ab155085bb504fa3d4
SHA512b920fb094af608bb9755882415f4a5478af659b0e4764dfd322eac2015279ea93d3a146d77fdd0075cef68c9e53e8cd3082a0a4211f1dd1c0e1d3e28e1ca2073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1669cba05dfe6904d775cb04e992c17
SHA1268534f4faa7cb73799cec18cd7c394a69bfba78
SHA2562a1f7a9beb6070a823ccf963d35f2617eaebbe4b30cf2a75d999b653f6300a99
SHA5121e0c2b0b7dc730add6c71ee6b9f0868a806a8ba0b9a3ba1f2c443f0561bf55ab83422f158dd4a297bf4b3e762d7db2e8469d210f0d93f68cde78ce64d5f7b33f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
605B
MD55abe714f13baffb828b29da700863599
SHA15012bc4e0a6e2e8c447cb472b74e48b8bbc0eca0
SHA256635162de1a554de4c338d6f80110f32760f59ea78319252eeb8f54f717505bdf
SHA51216a4c55967c5e405e76f0aa850280a245815d30cf566e1bb100407bc1751e5c76cd1db6e3e1160071524f7aa8893d48e65945d62c99c23b6e9870f17b203e84e
-
Filesize
46B
MD55abf17ac58c8256ea0dd3c0e41ef0390
SHA1e2c2e7504fbc174fa16406bd9d748bcd0fc83a42
SHA256f62acee0fcf03d38a8735ba0cd0f16399acba9ef2d3d66e229bd8cadca3e42ab
SHA512bc281726f559f0b4d8e3d119d966d56d3b284b4a7e0a9088624ee1513c66f0f741d80ca32244ba356328e9e9d840dc92d36d325b605129be4ba57cd3e796f0f1