Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2023 14:30
Static task
static1
Behavioral task
behavioral1
Sample
b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe
Resource
win10v2004-20230915-en
General
-
Target
b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe
-
Size
5.4MB
-
MD5
df17555ff1041dc1d0d5dc7b986fbe6f
-
SHA1
4575bc1867aef8881e6029c50674b2f4be38abba
-
SHA256
b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600
-
SHA512
c8cc3860c20d0724bd0fc2dac59619907663960bc69699577df3891cf692abda1f6f75d7ab7a8a9acaff0510329a90917c0f3612fb71399c8edfbde443839216
-
SSDEEP
98304:Gtvqj8gb5so7CtqwHHlbf5aNSefAZXhcSlFax7Wyu4fd0+D5ol5hxDipwG4O:GdqgCWo7C0EH9td+Soi2m+Dil5hxY4
Malware Config
Signatures
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/632-0-0x0000000000400000-0x00000000004B4400-memory.dmp autoit_exe behavioral2/memory/632-6-0x0000000000400000-0x00000000004B4400-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Bcdedit.dll b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe File opened for modification C:\Windows\Bcdedit.dll b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\laomaotao.net IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1406239861" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001525ae190b18d34db1dbd7ec81932576000000000200000000001066000000010000200000003668e348f5ecaa455e3d28b13134b9dd6dbde8c8d06cacdcd1021afa101feb75000000000e8000000002000020000000179a43014d9b434d2aebc72ff2e8b0fbe8b64c974a5dc7c53f6ae22fe9cec88320000000c67c823869e1353e4a08e88e916d88b45ccb5e4aab7bc61d317d857ba745fe2a400000009575903147712c9d2bce7a4f64b33084f4a480ca932f24d5da1fa65942ba1402e1031bf4999b186cff0f3dec8630a95491e56863ab04905b0a43acd027cb7bf9 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403626847" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31062717" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7F0AFC1E-66B0-11EE-8688-56402FC161CD} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\DOMStorage\laomaotao.net IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31062717" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07d3359bdfad901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\DOMStorage\ghost.laomaotao.net IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fa1d59bdfad901 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31062717" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\ghost.laomaotao.net\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1402331299" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\laomaotao.net\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1402331299" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\laomaotao.net\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001525ae190b18d34db1dbd7ec8193257600000000020000000000106600000001000020000000c6a11d2adf7f5aaf3b3223be88a22dab82fc5ddd1af35cf85e3a3e20f43d822f000000000e8000000002000020000000897ed701b6cfce84489ee19ea87381054dd144f240649d1fdeb98caa11614d892000000069183983a235ff75f20f4df1597214f93dfb1f95fccddbe783b1e1c22fd8fedb40000000237e7baa557c0896ed0e41e426d49ac823afc2376b7bf82690c30b8fe581564fa68e62b3f7b211e42c65d0231b2f2cb97e271c30c5f75646d16115a9fe59f3d0 IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1120 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 1120 IEXPLORE.EXE -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 3700 IEXPLORE.EXE 3700 IEXPLORE.EXE 3700 IEXPLORE.EXE 3700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 632 wrote to memory of 3908 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 93 PID 632 wrote to memory of 3908 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 93 PID 632 wrote to memory of 3908 632 b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe 93 PID 3908 wrote to memory of 1120 3908 IEXPLORE.EXE 94 PID 3908 wrote to memory of 1120 3908 IEXPLORE.EXE 94 PID 1120 wrote to memory of 3700 1120 IEXPLORE.EXE 95 PID 1120 wrote to memory of 3700 1120 IEXPLORE.EXE 95 PID 1120 wrote to memory of 3700 1120 IEXPLORE.EXE 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe"C:\Users\Admin\AppData\Local\Temp\b9e512e33561225697a141535fc81bd2e74f1df085baee71207b97a020ac3600.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://ghost.laomaotao.net2⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://ghost.laomaotao.net3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5919019b3f6342e9b469c1b45cfe89f4d
SHA1901afd53ea53ef92ef7d66f7f7bab9e518587bc9
SHA256b3d052771f17daca2fccc1877dc0344e95d1a1d8c1305d957bd3cad6319e6453
SHA512810275a1ab8778465c8841a534fe440562ceafa6947cca320696621ae0415d7bdbf235c655779ee6f640c1592419874127f356545e51a5ee14d43ae8fe339145
-
Filesize
1KB
MD53ccd86b77247e5980b0295c59352af44
SHA17d4efe829eea4feacbff8b79966d599b131d039b
SHA256aaaee4f05335317f7572d057b57d814ffc85ec388e982027e6d17bd6d43bedce
SHA51261da856d6a547e73a664487169b54722209338a49036cc7a9b2d9057ce6594f4e8b539ec65d2b2e385420a328882a67bcd6bd94aa4d2ab97ccad2a2e232532fb
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee