Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
25a3a82cfec2bb53281e68eb14718c94c362ab6d6d3a4f6b172019a90dec3cec.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
25a3a82cfec2bb53281e68eb14718c94c362ab6d6d3a4f6b172019a90dec3cec.exe
Resource
win10v2004-20230703-en
General
-
Target
25a3a82cfec2bb53281e68eb14718c94c362ab6d6d3a4f6b172019a90dec3cec.exe
-
Size
327KB
-
MD5
0f7faef5a39a8d1595ad659291bc3fc8
-
SHA1
794df0f04d8564e0d4d8e4d1a7836bb4a4741f38
-
SHA256
25a3a82cfec2bb53281e68eb14718c94c362ab6d6d3a4f6b172019a90dec3cec
-
SHA512
24f86929d8aa288ccdcfdc0d2dc21044ed81dbcbc934ea0c1d8f13b6c009c30886ab5fc5068e11506c26ad2d54ed9de2039c891218bb002ea191eb4bceababff
-
SSDEEP
6144:3NgF4DxNuJc06j4YBa77xMQxA5i5knmv1SL/mQX9B+YZg76lkp:3u4lNAtYytvS5Aku1YLZuGl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31053424" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399635598" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2051926729" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31053424" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000052a69338ef97e94eb4d938c2816c6e0d0000000002000000000010660000000100002000000076e9a4911f461b4ebaeccfc51e962c2191541b41e66bd426baa4c1a33905fa6e000000000e8000000002000020000000f328f9a09be7d1988fc03afb946975ad0ba20b649573898a043baf30be31aab720000000edc8498e2b15bda12f007fde1f19bf82db13f9dcf7d6e87756c5dcae03abe9d3400000000bccf4503c3bf95d03e2a0ab0ff5590490a07c5efab22612bbbb651ab986aa52d9b303f8f0f141a393a8f853868cfd2d32c3621136b0cfb5f368a6ac3f2770f8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2051926729" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A322A369-4263-11EE-A95E-FA18DFD6C72F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02caa7870d6d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4084 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4084 iexplore.exe 4084 iexplore.exe 4136 IEXPLORE.EXE 4136 IEXPLORE.EXE 4136 IEXPLORE.EXE 4136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1848 wrote to memory of 4084 1848 25a3a82cfec2bb53281e68eb14718c94c362ab6d6d3a4f6b172019a90dec3cec.exe 82 PID 1848 wrote to memory of 4084 1848 25a3a82cfec2bb53281e68eb14718c94c362ab6d6d3a4f6b172019a90dec3cec.exe 82 PID 4084 wrote to memory of 4136 4084 iexplore.exe 83 PID 4084 wrote to memory of 4136 4084 iexplore.exe 83 PID 4084 wrote to memory of 4136 4084 iexplore.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\25a3a82cfec2bb53281e68eb14718c94c362ab6d6d3a4f6b172019a90dec3cec.exe"C:\Users\Admin\AppData\Local\Temp\25a3a82cfec2bb53281e68eb14718c94c362ab6d6d3a4f6b172019a90dec3cec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://skjp.zcjczj.cn/sgdh.html?s=126&v=127&c=132&a=95&m=&t=16151897152⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4084 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5b2c81dc385d8027dfe5316af20681390
SHA12eb383d6f116336c1007e8a772052739d0da8a9f
SHA256b487445e858a87d2a91424e02a843ce6a56e859760674c5c7666418130c63406
SHA512de8aa3e9fcbb795c1988ffdbc15e349fceadd52fbf0bb62be17beae0b9b2c211a4f0704b89c07e845ed923c1aef5d603cf7eeb3daae9acc88488d174ef864feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_8BF7518DCCE0D7692B051F7DA079DA03
Filesize471B
MD59bfd06fbea15e175df5bb09c77b77c83
SHA187ed2435e77a129a163253c10a2d83a4dc240ddc
SHA25687e152f8a9d1be307dc00fafd775739825468b1348755c56523730ec93204833
SHA5121a585350c9b646b56dfcf80e252e9fab6428dbf1377b4cc8e5d1e4c1dad896a9eecca5aa73dad00bf73b53e62a3252866e1afb9d9086efc47001732f251d4529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD587f9f847c5737f8e1abb8d4810a449f9
SHA161c605cddf9df543411416b8bf46cb87b8c1cd57
SHA256a946f384a99a9b865c3e98f02c93c9265b83a36ebec8f7f49bb5b25992fe375c
SHA512223b95f9346d657160db20ba71650e46679342e14fa93f1aaaf49a331dba7a9e025da38a878b3476a9205a4397d2a8dbc9503d2476603126bcc67e64c711c769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_8BF7518DCCE0D7692B051F7DA079DA03
Filesize402B
MD52779521aba65b9437a7af2fe0b05ddec
SHA1399673e50e3d96bf1772a48ca7feb5ab3771e8ee
SHA256b8cd98e916cec8f6fc194bef22843edc50c8687f576de063d9f8ba2debe5b6a2
SHA51265115f2cb1af77007a442e609b57b18cfc6e6eb055f3aecfbfb7873cca214f4d503b4df4abe371332dea534d74cd298b743d48eb163d496f1c6df0b734ae9723
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
772B
MD5ca09381cf8406667c77a4e00f08ed563
SHA11f78ba6de6c8acdfcd3e15bc6ace2e9150c85e3b
SHA2568a880ae2d4475d565cbe5921db797f5944f963c71f49539476c3cffea0bf938e
SHA512801c06a7add3ed7d707ba26e3642cc82c7817e4c3c1c4ecf512bd3d2c7ce0867b34d7ea3ca8b3b07a8ead57334452eeda6ae13a880ce16e5478a3059e08f37c1
-
Filesize
628B
MD58b944f7f1837308ddab3157b96a7c6e8
SHA1fdfa7147a25be9bcbb8200f010c584a8724b6a5d
SHA256d7bcfebd688fa69f028b2e55268e6475869d83011799104d7a315cb8e34fa18d
SHA51228cfbfea2c4410b2b3e86d5514cb8a4eca0bacb6adcb9636184645c92875457b8288601f8ec158578d1b5d7858623f271c6f97dcaf7b60184e6443a9263bb029