Analysis
-
max time kernel
84s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2023 09:39
Static task
static1
Behavioral task
behavioral1
Sample
0a40fa4bf3e3f294adad6ec58e3aa240c302d5071dcb7b7d8c0f14950ee4c441.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0a40fa4bf3e3f294adad6ec58e3aa240c302d5071dcb7b7d8c0f14950ee4c441.exe
Resource
win10v2004-20230703-en
General
-
Target
0a40fa4bf3e3f294adad6ec58e3aa240c302d5071dcb7b7d8c0f14950ee4c441.exe
-
Size
327KB
-
MD5
4d05502463e1a007138185cef705c563
-
SHA1
f60f66e1f597982789265df302634a5067338ddf
-
SHA256
0a40fa4bf3e3f294adad6ec58e3aa240c302d5071dcb7b7d8c0f14950ee4c441
-
SHA512
a8dc39bc1f9980ad8d8c87036b16d63f6c66f51fbfbfbac32af118f7e4cc199467443737a7f0da7681aa5fedef6dcab6eb854e7c3a2e32b07ca7221360e42ecc
-
SSDEEP
6144:3NgF4DxNuJc06j4YBa77xMQxA5i5knmv1SL/mQXQB+YZg76lkp:3u4lNAtYytvS5Aku1YLauGl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31053825" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31053825" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1536981955" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0782b5c01d8d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1540420110" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a07bbe79b265d14db3b0aa02a3882147000000000200000000001066000000010000200000005c2dc4719a1e8c09c5703c5a696a5ffde13399b16f1934adf7286864d82da128000000000e8000000002000020000000413f75692fb50e64ebbb044de7bd778733f699e9ad58a0a8529807081e34b3b720000000db0d9c770ff704faeee31bca2da8285218df95932dcfd81d17d8f0b5232b29854000000049930bb7e50cf8f4b373675b440d08a827327050d8fab1ed783755b0b41728ec98ea9574abd42b2cb44680015e291dd67641217696e94dabfedb3e7c7ce7e2d8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8700DF97-43F4-11EE-A61E-CE28E34818EB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31053825" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1536981955" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399807776" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4556 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4556 iexplore.exe 4556 iexplore.exe 3640 IEXPLORE.EXE 3640 IEXPLORE.EXE 3640 IEXPLORE.EXE 3640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4556 4452 0a40fa4bf3e3f294adad6ec58e3aa240c302d5071dcb7b7d8c0f14950ee4c441.exe 81 PID 4452 wrote to memory of 4556 4452 0a40fa4bf3e3f294adad6ec58e3aa240c302d5071dcb7b7d8c0f14950ee4c441.exe 81 PID 4556 wrote to memory of 3640 4556 iexplore.exe 82 PID 4556 wrote to memory of 3640 4556 iexplore.exe 82 PID 4556 wrote to memory of 3640 4556 iexplore.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a40fa4bf3e3f294adad6ec58e3aa240c302d5071dcb7b7d8c0f14950ee4c441.exe"C:\Users\Admin\AppData\Local\Temp\0a40fa4bf3e3f294adad6ec58e3aa240c302d5071dcb7b7d8c0f14950ee4c441.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://skjp.zcjczj.cn/sgdh.html?s=156&v=157&c=207&a=95&m=&t=16154301562⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4556 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5b76a23b37666a7437d014c8f45e0c843
SHA1fac0f80c6161321ab45222f5c7b74a9d14fe0aa7
SHA2561fa8f775e6d41cf817e2a89d7b35a469f8c511b5e6f2092afc58bad8e743075f
SHA512483c9f960400347614dce89560af6be1547627438af1a0464c9ccee9e8906df6957b68ae547dfce5adf384d5f4eccd2145e568c386c300a073d254bedf7bc24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_8BF7518DCCE0D7692B051F7DA079DA03
Filesize471B
MD55e434f554c1296d0626cdfbbaa5191a6
SHA1184e996c95ae3cfea9e1b11d54de370338768750
SHA256bcffcab2200cebd8a6080203432a655153877e23882fccd3a03e17e208c37fc1
SHA512c7f2ce619603f337fec4fb14ae9e509b3d5d04ef0af3b6a38ecefec62a2f17b085cc54880ed3105cfd3d3ac9e0c6f0da22b7c1abf002587ce6eebbe158d98694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_E5E634D70AA6544AC8AAD5B4D1EA78DE
Filesize471B
MD530b3a8afaf9eedae1376a7fefcee1b96
SHA1f488e2004ca0e45d645f8c8b92efaab8cbfa36b9
SHA2569eb5271b4775490f73993be5e5d1b5a302799163442dfffbdf01dec604233036
SHA5120d6652b2dffaff7bea65d9d822d88ae781336042be2ea7414f53a726f93a8a0486ac356ce640718fceae4d02471b4a2043e5c34bb6d350e085b6661e1f9ff0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5814d31c4ef17b2f1c7c480a3db9ccc04
SHA19630a8e7d47046383885e10ffa34e381ade09fd2
SHA2565dbcb176af0f2c27504351839615a68d86abf9cad95b040ddef5531910462440
SHA512e11186897dd03d84d76c415f0cb664d4e5eea4e14e6f58e4a810b6884368b318dc60172448fbd23f1537ee1b2bd593af99cf7a6e1eb1be121633e5849bb5576a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_E5E634D70AA6544AC8AAD5B4D1EA78DE
Filesize402B
MD5b6b5e62ad4eaf9bf1c7f955b94fc8854
SHA180662b4822dfbee4262331fe44a4692f611db58f
SHA25616766c35549502a0ad6ed3ab891ef21ec4969eaf2fb6798df96e2465a670d9d6
SHA51251df808969341b633d1e8e21868553524759fbc0952a269b5bbc42ecb4c3302dc66414ec3bb24ac0e08a759a075ffe06db89a8079dccfe6eea0ff79a4f258153
-
Filesize
772B
MD5b54ed5cf8ed130ffd4040057a88a3fa0
SHA18bb607220ece74a17c30d5f33b5655ae4ae24c87
SHA256589fc3395f107ea6b93a79f87214f77dcb91555004c747cf1cf6061ab4eba834
SHA512f9b4b29d282ae725d47fb85847ab377f154d9676723b990360253d8983d3c8a73f4c98f57230e7010d7e3d2cbbe957788cf9276690b51a6b96d2da48338578cb
-
Filesize
628B
MD58b944f7f1837308ddab3157b96a7c6e8
SHA1fdfa7147a25be9bcbb8200f010c584a8724b6a5d
SHA256d7bcfebd688fa69f028b2e55268e6475869d83011799104d7a315cb8e34fa18d
SHA51228cfbfea2c4410b2b3e86d5514cb8a4eca0bacb6adcb9636184645c92875457b8288601f8ec158578d1b5d7858623f271c6f97dcaf7b60184e6443a9263bb029
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee