Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
06-08-2023 22:43
Static task
static1
Behavioral task
behavioral1
Sample
wfilmorav12302341-zmco.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
wfilmorav12302341-zmco.exe
Resource
win10v2004-20230703-en
General
-
Target
wfilmorav12302341-zmco.exe
-
Size
21.3MB
-
MD5
a639a2dc429cd3a67714b77fe41e2bd5
-
SHA1
a4caf31a934e0bcc5ef18f28be6629b7d0a2ba6c
-
SHA256
874b4ebc5e0a19a943ccb68776dad911731c2f34606fffd7c861f7c4a304e64b
-
SHA512
b198481e3949fe1b3ea4bd9f29141f6744f4aaf4ff6f7abd2fea5935b2c38738333c6eed2b5b028b308d979b5b3c305fdd4a626a114ddbd96fc018db9a9fb3b1
-
SSDEEP
393216:imwfdzbYPePzWsOaEsX7SFRFy5/cUyPfhMGEIGwwGZymnE0Q71kihihjGzkrBd:/adzboeP7ORjFR45kUMfrEIvwdZ71khf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d4a2d1b7c8d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC3897A1-34AA-11EE-80E7-CA145D9C6258} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae00000000020000000000106600000001000020000000f2fee30ed54b8416b43c96e03de0527a1746a96a1624b52bf45ae8e3c5894a89000000000e800000000200002000000021d4a2127daca55e0143efcdd35e24b30d353dfa1538d4a94f09007148770ed9200000007bdba014612ff4daf9e1ba04275baee0e330543194dd185ac896aff1807ad99e400000009239ca5436397a11c297ed540419f97746637642fd72363d0f3432cefc6beb94bf9a6e87f18d9a1c1035538f109e21ee212f56dff4ed99947418d965f87249a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3032 2572 iexplore.exe 34 PID 2572 wrote to memory of 3032 2572 iexplore.exe 34 PID 2572 wrote to memory of 3032 2572 iexplore.exe 34 PID 2572 wrote to memory of 3032 2572 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\wfilmorav12302341-zmco.exe"C:\Users\Admin\AppData\Local\Temp\wfilmorav12302341-zmco.exe"1⤵PID:2316
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:296
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\WaitInstall.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce7a3a73a506f69e99c9d212556b085d
SHA10433683a34e5457ade021f6ccc8c1de57671f0ee
SHA2564bc7683e22988bba60e4b601d1821dca96cb885fdcefd06ad96482c222392874
SHA5126a7b52bcaaa664f09e7dbb69e897306bbe36bc0502b10b9eefe003c4e1dac55848582c042f919fd56d078809e83707b0201ef97a94153617fe3d106ca7fff614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5365c74715c43afcee0277833c3a0a718
SHA1db3008461146782f3a710fa17fcb287db2b65748
SHA25655e96baf7ae893487c6ebb6a2c66581bc4bcf83a1b6a521c9c45b2bbb2f441c9
SHA51258b5402c14293a9f8293d49980f0f40448c27c9928da10ae12a2b8634faf76bda51dcfa4ccb1e8f2683cdaaf6e0244c4dc00ad21c5e89d0d4eca4388ffb288f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c4f82e58715453abc86d5bacb534631
SHA15e013141a3d0d8a0754d5ccda5e9730986fe6cee
SHA256593f2e9b2bb84d49707ceadd27db3c842ec08515570bad4c8a3f3d689c0cce51
SHA512f65f88217202cc7da678a0fa866ce307ceee7ce586b30c9ad3fe2b533683faf66be87433d6a8a923520c1bbf2ace90120b9e5621694fc2ef1c2331084b04731c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e402489dead207b8f79bb5b83a7b1b7e
SHA1b9ed61209b5313f33ccd86bb7ce3cb0a34b61383
SHA256057001ca6680907575f9b896c3fcef82982b86d7a222d91809ad4b770a29260a
SHA512a6ea168add23a4d6ff7c5579b9fb2b2b5f77b5e61254389e3c9c82722ba3159c8cdc914774e5f664f747c292ed28f167a44e1feb4e8b76fc25c2b11fd2fb57d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeac131a52af62f7661686d70098b5d1
SHA110b53bbd9944117faa470aa2a640f5ca7e446cf3
SHA256908c3e290b6627eaded15c587005274415b0e5bd03951f6b060727197c707a92
SHA5121988264e836e13ee8ccc64136452685c80c5ebd10237a1376f594bac88701775ea14ac40069d0b33fb3eb3899c57ce3afa411442c746de87ae04b32dd8966b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac323abc187cfa45978f2689bed2462
SHA1438ef3fa1d7b307c2bc9edd8402b4bd1b168646b
SHA2562062634b671a83dd8e1ffeca40cf5d505c5ca2acd23a018db3791e9fe72edb9d
SHA5127875552624773d04b0e5198e5810db211d96b10b961bb6dcd4ff4b32eb6baff87f3a9e19aa28cc1576fef0fc04357bd53193467f3b3ad9f39637f228b95990ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb17bc5980d19588525d9092adad25d6
SHA168181188b8a6823d18b716c311ddcacd4b2e6941
SHA256b569edc903258b3a18ee5ccc842950029d445a8f2518baca35add0a2b81153d1
SHA512055d5e3de0cf85eaed6e44ca9bcd525a6ef00409b1407c5b285985876e337c0c7da4185e6a3410d1fb71b9d280cf8f66db4afd4485565528f502a31fe05d0155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b279c1d54419d7d80ecf4fe77c8c12e
SHA17d6aa65a47c9c4b643589b9cb38ecf06cd3d4c3c
SHA2560d8d6e67e87da2e9eb008de09570095fce2d32f6c92b52c3d8fdfd0f025ba98b
SHA512885c3aaea0736ef944126871d02f1e020de2ef55cc4d3ed99984bca4dfdc85048f91ec0f2fa8edfa0a6f859b8793fbdd7a079c374fc33eb0615c1ad70b36486a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eafbb275ce410c070018c97ba52c9a7
SHA10d20a32dfbe9fa12c1916c21c01d7e3ed28cef19
SHA256c12766c59eb4e90ec947c212cc37e44c0c4564fa4291aa85aeb00a33d8b0d287
SHA512b90c420397799a27c2b4ce89269eb52559a083e50394358f5b55b8871111db9005f4a210341e8e81201a07cad4145ca9dd265dc13ace32fd8585d787de3cfd85
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27