Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
29/08/2023, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe
Resource
win10v2004-20230824-en
General
-
Target
d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe
-
Size
3.0MB
-
MD5
c1e49203d8c2e401f3cffa82d0ae1e3b
-
SHA1
1e2e5d710339ad2f8ebe85e60fa9dd5e797b64b6
-
SHA256
d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff
-
SHA512
45768a75113b53b1e9ae9aa9ae2b46e7d6ddc8392d61b81fe6382aa2f11d88b91efdf17577bbaf2d66a9db9b1d04666d9483e96d30e16eecec493e964591c4dd
-
SSDEEP
49152:vzhvfkii5PlG4y/AAe8jmsbazWYVoLtfMEC2SfN8RrHrKBST1WLvlX:bRMiitlG4y4ALSseybtbGNVOWLN
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2960 GrfCL.exe 2848 GrfCL.exe -
Loads dropped DLL 4 IoCs
pid Process 2904 cmd.exe 2740 cmd.exe 2848 GrfCL.exe 2848 GrfCL.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2904 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 31 PID 2792 wrote to memory of 2904 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 31 PID 2792 wrote to memory of 2904 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 31 PID 2792 wrote to memory of 2904 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 31 PID 2904 wrote to memory of 2960 2904 cmd.exe 33 PID 2904 wrote to memory of 2960 2904 cmd.exe 33 PID 2904 wrote to memory of 2960 2904 cmd.exe 33 PID 2904 wrote to memory of 2960 2904 cmd.exe 33 PID 2792 wrote to memory of 2740 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 34 PID 2792 wrote to memory of 2740 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 34 PID 2792 wrote to memory of 2740 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 34 PID 2792 wrote to memory of 2740 2792 d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe 34 PID 2740 wrote to memory of 2848 2740 cmd.exe 36 PID 2740 wrote to memory of 2848 2740 cmd.exe 36 PID 2740 wrote to memory of 2848 2740 cmd.exe 36 PID 2740 wrote to memory of 2848 2740 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe"C:\Users\Admin\AppData\Local\Temp\d2d1c1a7813ed6b2569a233bbbd94a62b7924afbb872b646a36e54900e4b22ff.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c GrfCL.exe -new -save mhgd.grf>C:\Users\Admin\AppData\Local\Temp\BetterRA_Update\GrfCL.log2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\GrfCL.exeGrfCL.exe -new -save mhgd.grf3⤵
- Executes dropped EXE
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c GrfCL.exe -merge mhgd.grf 0827_up.gpf>C:\Users\Admin\AppData\Local\Temp\BetterRA_Update\GrfCL.log2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\GrfCL.exeGrfCL.exe -merge mhgd.grf 0827_up.gpf3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD52811cfc2d2ba8e260b6ea0537e9ad228
SHA1f3406cfe4ac95cbebb5c895614a0d30c07152bd1
SHA256d16bd373f5107bd4aaa091ae9c2ffc8c9842714dae76ac8a1e1ea0369bcd0b13
SHA5120f6e943198dab1a395507b21fcb22242fa4491a12b2ea46019a94f46180b6e8f63f9a4d80fe137956f2907bcc86e8f56a44ec7c5464deedf067f4048cdbfe3b4
-
Filesize
146B
MD5db6cdb0885b27044878fbe0c77802467
SHA1649c54eea9a5c54297f737baa34981a73d89de33
SHA25680afef9539e9f15a78436455f69215e19c4869916e976524a7b5454d6c8ede6c
SHA512416dccf1b924189c84b00b58d521bead6bf78ce067003cb35f60a8e58a0be23f1097921b778e42e85527a06b07fe34dd1fc71fbaa52c31af28a40a0e8ac04932
-
Filesize
767B
MD516de84fedb2d028b9801e43db05391f9
SHA1c47dde252da44c36caa449d2c672c37c140936b7
SHA2568ea70f86fde38c19239108b4596c755c7aa73adae9e4aa2cebbb56836a4a0e69
SHA51258b39d42b0dcb181e4f1072d4ac87f44c33a8afeed355be735f46de0261473aa1f00584fc589a21c1387e1f81ace4d73c505108ef3b197a89f508717a9b22fb1
-
Filesize
2.7MB
MD56e367308f625126d19e6d313bb98fe7c
SHA183635fec6dcab0bda18e8d547496c52bc0645e1a
SHA256180aea617689e41a0ff4f5bbd9182823b3bfd88f8e19c1ca071fdb761e30f32a
SHA512c6ba50a74e36e2b352fbfdfbbc80fef09fb48bfccc3120322a784eeeff35d7f282958f64c4c2e9e77ef961d022bb27a43bc5e4337622698e3ded3e3ed5a66566
-
Filesize
2.7MB
MD56e367308f625126d19e6d313bb98fe7c
SHA183635fec6dcab0bda18e8d547496c52bc0645e1a
SHA256180aea617689e41a0ff4f5bbd9182823b3bfd88f8e19c1ca071fdb761e30f32a
SHA512c6ba50a74e36e2b352fbfdfbbc80fef09fb48bfccc3120322a784eeeff35d7f282958f64c4c2e9e77ef961d022bb27a43bc5e4337622698e3ded3e3ed5a66566
-
Filesize
2.7MB
MD56e367308f625126d19e6d313bb98fe7c
SHA183635fec6dcab0bda18e8d547496c52bc0645e1a
SHA256180aea617689e41a0ff4f5bbd9182823b3bfd88f8e19c1ca071fdb761e30f32a
SHA512c6ba50a74e36e2b352fbfdfbbc80fef09fb48bfccc3120322a784eeeff35d7f282958f64c4c2e9e77ef961d022bb27a43bc5e4337622698e3ded3e3ed5a66566
-
Filesize
281B
MD5bedcb4f86ce392dc37fec12ecdbf9a75
SHA11b675d9d4edefcf14c116c17b2a2821966be3675
SHA256bf9bf50e3c785332e00ea991978b8f6513a20d6c09dfe8337c409db71537789b
SHA512488278f5fdcdd6f712c0002424441f205efc2c81a41f89369f9da9dc4a6a6cfa00becfa3bd473e1fb6698fcdb78cc382fe77d171ffd2f13077f54c152373b00b
-
Filesize
2.7MB
MD56e367308f625126d19e6d313bb98fe7c
SHA183635fec6dcab0bda18e8d547496c52bc0645e1a
SHA256180aea617689e41a0ff4f5bbd9182823b3bfd88f8e19c1ca071fdb761e30f32a
SHA512c6ba50a74e36e2b352fbfdfbbc80fef09fb48bfccc3120322a784eeeff35d7f282958f64c4c2e9e77ef961d022bb27a43bc5e4337622698e3ded3e3ed5a66566
-
Filesize
2.7MB
MD56e367308f625126d19e6d313bb98fe7c
SHA183635fec6dcab0bda18e8d547496c52bc0645e1a
SHA256180aea617689e41a0ff4f5bbd9182823b3bfd88f8e19c1ca071fdb761e30f32a
SHA512c6ba50a74e36e2b352fbfdfbbc80fef09fb48bfccc3120322a784eeeff35d7f282958f64c4c2e9e77ef961d022bb27a43bc5e4337622698e3ded3e3ed5a66566
-
Filesize
72KB
MD5aa0af6f7cc27b34497fbf44118a50a43
SHA17309cfe429fa4d8090b922c24b1663f8c09c38c6
SHA2560c02edb2952ce0e983de43b7f5919bfe63df1a20be6e151f72c6640e9f2b4d4b
SHA512a4d92d5169f5a10110f26f841dc28283404145f89d52ca28d2ca80bab5b0873e946f431c5c563eac3ca519d94678a4a604d7cf802c7dfdfbeb664b409d008dea
-
Filesize
77KB
MD5a8bd77e9fe1480c81a7f44b3734c6071
SHA181a6359d90622c4b63e57d872f98e45604e85f2d
SHA2560f0fd127278e80f74832003518688859b5e4e17820206224ea145a6f17352a4e
SHA512e75427360fbd8ece3aa427a298aa5958eca890bd5c5fcd3db7be8c26360293ee1cb96199e70f042a35e482c30c37df7d9eca7864999508bf9a4dfdd95d77dd3a