Resubmissions
03/09/2023, 16:24
230903-twge9sba2v 603/09/2023, 16:18
230903-tsfdssah9y 103/09/2023, 16:18
230903-trxxfsah9w 103/09/2023, 16:01
230903-tgjxvabd43 7Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03/09/2023, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
21mDJCm0.gif
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
21mDJCm0.gif
Resource
win10v2004-20230831-en
General
-
Target
21mDJCm0.gif
-
Size
6.3MB
-
MD5
30cd8b85b2a203cd9ba81de0d5b43462
-
SHA1
91086e3d6121a76c2269c333a0466b301de8c52a
-
SHA256
63bef0f06a1edd62aca4c666ac89ea94f09817f9355da918130f0299da85e923
-
SHA512
4382ea8d33011adf1ac1d13f6c6bc30e3664d693c95dd7ed998f9b67086f419d70b9ecde3618ef5c637e63d575a8b420d1e2f407cd1385bed35a5d3c1d18764e
-
SSDEEP
98304:RVIUqcdD6rR5bD+rp1mk8t3TEvMOUSsRtz2Cq833I:l9g70p0b3TExatBqx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002bccc567d90a0b479b49b1b2d43318c300000000020000000000106600000001000020000000cd1b399b2812cb17954d06825c6c25b8f254b0219e912537c106a4fd0c14a0e0000000000e8000000002000020000000a4670129b828ea961f8709a3ea7a9c1fa88669e619f22008a5f2d15aeb4a50b920000000873f0639743e20f0844e345304bafc114bc105e8d0cda8f13db04a297f95e93a40000000f28e0d9b0145f27abf0a42bf2f3d8d0563cf0971c9f4fcc6f43c864edfdcfa184c47c7dfc40d252d7664ccaacd2444591546581276137dfd681012de3c2603e0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79D42F51-4A75-11EE-829B-7AF708EF84A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a077d04e82ded901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2972 2288 iexplore.exe 28 PID 2288 wrote to memory of 2972 2288 iexplore.exe 28 PID 2288 wrote to memory of 2972 2288 iexplore.exe 28 PID 2288 wrote to memory of 2972 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21mDJCm0.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5908bebb53b19e5156c4262f7623881a3
SHA17ed34d0a765bea8b27efef04e7016af880d39b79
SHA2563b1d94edc55838857336c1d0f22317219766ad05416c0b6ae5d52b81b12638ea
SHA512cdc0e62c24434779bca43b14aa37fe981cc79e87ec4bea0512339541a3199f8123ec7a18fec6821dbd2d85cec169eb15edbae5109a0359cb7c8bbf52b66c8878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9c2715e7c700c2b12254054308cf7cd
SHA13b61852c644ac8a629b9c8b666b1e1cf491dd71d
SHA256e269262d92e4663280b45d56a4ee9322ddecdec1de76b2a001e1c67e9868387a
SHA5121d3a5845ee595b8b396a6d61f373e5cd1b49f556cfbd0f545dcec4f2d4fe74588e7d6bdd5df60fd83c72427fbbc142b49da74fe6b2f2959f223013fa1d6cae3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda9a22df986a42e2e667103069b014a
SHA187eb4fd10fadb6ec597c82acc486d4820efe09df
SHA256d6077928e4741c04da1b6ad38f6d97762bcbc455b685e0448dc2787c96cea128
SHA512d4fab7abfb4ae5133fd6340970d57130ee380a72d8ad3f0ead27df14e7a4956b59b6d6ff1c32485855352994168e165cfaf3fa441f29f17e1e72dac30eee211d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586664f3cbca51f8557d7730f825a1c82
SHA1978499f458f7045ca54a3963665cfb016b9024be
SHA256d131ef90442bc989173bec4e729fbac1c1b1176797da1cb0d92dcc347b3f3456
SHA51226025314164db7c501a60d05863d37b186cdbbe28d4ecd9cd56e0a8407a3a10079c8676a3ddfac43b0569a2037f17c67ac733ba595b7364bbb2032f044d9b37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58947691069f2b255661a4ec897f8dc1d
SHA170e0d6d71ad721719e4a97374745699bbbfa362c
SHA2568010cf1e317d5189e1a7009d50c623843e0b160760fa893b60c894cf11996caa
SHA512fae55a0625b7cf0d903eb2e25881841dac88d68cb9bcaf9f25aed16c454c82c6e0d3139ceb799c5120f3f02ac0b78ba5aa1b10a74d3b065d4e4eea561d4c1419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5562be621a277364f534f585a3b296a59
SHA1f268b84ae3bb3d894961094ea8ce14560746b97b
SHA25697589084be16b5cb38b94a799eb02672291c984b292e37d5dfa98bafc720a1d6
SHA512eb249d90f4776d7fa66b7f1c2fd2f6b65fca6ab0b94e841a0c1bb2620027cc4f958349fcaf340f7196309c9ac2b9bd401cbedd5e6b8e003d25aaf23938a3223a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df0b9f38a506817eec1aa2901704c6d2
SHA1bf289bcf11c0f5eecd2150acb9d4f268305d0c31
SHA25625e35128632a5bf64ed295c05d3c0955be4acf0b2cc9e65e30f599beb895c4fc
SHA512c999ec1a421c39f0d67be7401ed0e01f7bb37874c56e646a0b041938c7b0aeef621b27a0bce240b5c2ad63b2bf064d2a591edf42accf433d6930e35c7f225720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df2af9bb8c32151e13f7c402a8e3fe14
SHA124e92c31db76bf43274d3405984851944013c7c5
SHA25684f912c0ea0af60bd0f29f3c999842b1d21f9119cfd5e2e174fb3386c9a5fa43
SHA51246da8999c14380185cce74f4e971de1d2c4f1f6d94a270f7f1fbc9aeb848f7f7598abf009f81c20d83c72890ea262806b8eda65081fbc2081519ccd13c216f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fddc04a74cef7f20227619bbfc49b7b4
SHA172d1eec964ea997f421acc00798c98b44614c4c9
SHA256ea233b2e58233612a7526a4b13634c22f31202108ec855139dc938f2ea8eea0d
SHA51286518de18fb751a3c231643a4f061826f539a9317b458cd3e87dd1051b09e89e03e9bcb0f3b5ef046562353200667ebc05c3be357f238c1bbc16f9cbf2604df4
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
16KB
MD5a1856b20b32b4d93f52794a038cbb9f5
SHA1f03796450aa9b19bac18d13c904943a25b777bad
SHA2568b6de28148318f54d16e94207f1e6d1d9a62093726dfa445bed0a8da61119d7a
SHA5127ba6ca5588cf97158b9fe458c058994880bc6ebde068863c2a17d2161748861b6159d23a258c18737831ddee4024d3e284b0e0e0f59a9051da3e6dd43ca42627