Analysis
-
max time kernel
170s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 09:38
Static task
static1
Behavioral task
behavioral1
Sample
beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe
Resource
win7-20230831-en
General
-
Target
beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe
-
Size
2.5MB
-
MD5
72604b149d4d1ce8f84f4024e744328d
-
SHA1
53da26d9a87a0c6c983e55dd5604f836f8742155
-
SHA256
beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d
-
SHA512
0a192d3e6b98d56ce9b45a6ed6adadf781071514fb3defda2873e0fd9de00293c7a10eeafbcc1897cf63cf7d954c663b00363ebcc38e53a7395b0b41e1a05177
-
SSDEEP
24576:1NIPd/zHfWWrwPC6zwSO8VgJLdDrGnrdEROGHOhMkQJCtHYX6RC/hRJHOhHCZw:1NIlaO8qdDqnroHOnQhKsHOIZw
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\E: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\I: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\R: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\V: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\W: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\Y: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\A: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\G: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\O: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\S: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\T: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\X: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\K: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\L: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\Q: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\U: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\Z: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\H: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\J: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\M: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\N: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe File opened (read-only) \??\P: beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20be6ce353fcd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{066E6951-6847-11EE-AB25-5AA0ABA81FFA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002bccc567d90a0b479b49b1b2d43318c3000000000200000000001066000000010000200000002a80e6979ba307dee3831906dc40c9ed82b86833b0c7bb36583466e83b488373000000000e8000000002000020000000aa5a2ee5c08d6f93c6e43b127ff5eacb72fd88db16e8263a19e5e1ae51080878200000007855fafeee69c2f4fb54ae03865ef4634e311e94db73f36280d41894d6e8c10f40000000bbb405bcebce2a9e7fba8ff1b12794ef40e03f3f18839cd5bf3c1770a2dee2758204f7bf0883eb27033f49b60db7bef26f74e10feee535da9615d435b7a189ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2608 3036 beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe 30 PID 3036 wrote to memory of 2608 3036 beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe 30 PID 3036 wrote to memory of 2608 3036 beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe 30 PID 3036 wrote to memory of 2608 3036 beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe 30 PID 2608 wrote to memory of 2512 2608 beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe 31 PID 2608 wrote to memory of 2512 2608 beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe 31 PID 2608 wrote to memory of 2512 2608 beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe 31 PID 2608 wrote to memory of 2512 2608 beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe 31 PID 2512 wrote to memory of 2752 2512 iexplore.exe 33 PID 2512 wrote to memory of 2752 2512 iexplore.exe 33 PID 2512 wrote to memory of 2752 2512 iexplore.exe 33 PID 2512 wrote to memory of 2752 2512 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe"C:\Users\Admin\AppData\Local\Temp\beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe"C:\Users\Admin\AppData\Local\Temp\beb624f924ec28450508a17f7d0dc614c26d71f6046aa02d032fbc4fc18d467d.exe" Master2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.35my.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590969167c99f6be8e901a365a88f267f
SHA1d5ff91df3358d6ed8051f000e1ddf1d02c6cef2c
SHA256a962e1cf72f748784b72cf778f3c986c1f3731be4a6e0c91901e12f769c3d888
SHA5125ee4b542a4d9d33423e0db8f599a89865037ac92fa597f5fdb5cba648a66443461c3b376c2f9a2980aacb02203621f6b62a462206d03557d922c411e27631899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dce79ebf2c700e96f4076accf9edbdca
SHA17da02277c0cdb281f34b30ec8b9e5ad3ab3bad40
SHA256eff84b0fa380d389bedbdba30b6228eec7373b2786f943c602b3bae946bdceb2
SHA512c6b635fb7c9144d56f1e4459ae00dce2e4a0ccdeda32f096604db312f8269f088a71e3c28cdcd77377e05fc8359bd1760886d440e2fd1bd41ffe793fa347b9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391f095e66c8e8175a7e6568c74b4ef2
SHA1b593e733a3e06bae978bd47baa0364a6f87b25fb
SHA25685001e5e13dc5ecb15cdfe28de679a6f8df6fed982ac5e9fa7b5ddc79793b151
SHA512c8f56d1942d632c0eb3d109f992cb603eca7c29b486eaa076f2cd2e9a771f23adfb44d291e250a50dbe7dc27c85cdb9b3067cd8cdf728906c3c7a7573b5bf90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557035cb96431c7a23397d5814098a1ca
SHA1da5556b861de810d6b095885bff7ad5af51e6b8c
SHA256a000e0cf2ac3833163479d0f59e587e08084dd89f3d3a5bd865f0dd499930799
SHA51290866dbc597529e3e8cd928b052d10e5811e6d4cf4a614899c1b89fecc201c79cd0b8af92d1525be59d0a2be9397c17c495e1da41c8d037d194c879ac495458b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ffbb3baee7bbfef3bfac2d4c83ea005
SHA19e5d84bbcf78fc31971000409afcd3e21e2d43ab
SHA256d2852048b46a730e01a7ad342e4320d1709e650f2f07e522cc60a28834adf4b9
SHA512eec16248b06164219443c2adbec28f0465400f9c391aa1c98974d2bfea12ba9fcf58c43d7ec1afad69712eee8df8439becba0174888d5b3f39d91a7573a5f88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551cf75617ba464f642a96c1e20262b55
SHA107d503cb3644a31cd1219d3a8ccbc4bac78d920a
SHA256f841fced7bb3e2c8ac54c7adb5cad993e6871a49539ce240ecad5e302b1597dd
SHA5124e7fba43714a6e6a3e5d05132e5287785ebbd2febdaba3165077aabe15e8aaad02d14dcccf1f844f8753f92c3ad88841f5d8fcfab1499be479f0343acc03d476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5529427ac5bed3743970ba1d93194f8ae
SHA144cb5bfde7a7c0ea43ed6e8d0361c50906788af5
SHA256ffedb056ba9068dcc28bbfc4e3e494a47a7b88904915cb48bc09a0ab565cd5fb
SHA51235f89c9c0cad89028da40848159408e6b80e867460d9f726f761984f5c8c729783acf9d1ecaa7cc0122cf4b2214dc65bcccd5304c38387e8dc30ff003c378e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58425aee4547384b45b4ab009ebf23945
SHA11aedf5423f08fe99d45aa2ec7b6b0e0133059aa7
SHA256e8a1b993f3af877914a252881eaa3416a1af0a9058501d528d4a1dcec3dcd543
SHA51214a964401d2ed9ecb4a6504d064733f0902290adc160368407c8ba56b880651c4f2edd18b9770f92e547b2cc3dc53b3c5311e2fa634a8c48bc15853d050e8617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c7de51b9c219dc37644dbbeb9bc0002
SHA11ad81b0a708a86baa3d307606fb4ff3a420b0f12
SHA2563cb0b4cb4b1fdb28c7024a50a18fb1fe63754d29ee4b2dd705e6f68d37850836
SHA512694c36e33ec58ca77ea1789b9db224c5bb1cd1270cd4da2ae1a83742b0df9cbea74340a40fff42f9ed1c6e0c4910b02096790062b56c9b31a98b1bbf1e8edd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9d1472ac6407354ec9a958fd4c48102
SHA1d28cdd613ddd0546f63d679369bd7e296b64615d
SHA256b9240ca1c9630a66c9a144e313a42c84e84cca4debc33ca923eacd4227cc3d1e
SHA5122938bec2780874398275a96722b856933d9393fc282fec7ea7d596a66c8fde6c4cb0be1926a2de69b9c61b700033b29249aedb84c70113acb4db27dc6577359c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5872a5638515f647afe8e66489355e755
SHA159ec805cf66ade62036d6270abf3749305fd91e2
SHA2563ed022a01ed2c3ed1bcb702f203f22c04a653d13ceb6d79eb5e557f90a8c0e4c
SHA512d4bbe3a14a43aca2afdf3392a012d06da4fb25661526ecb49455136ed9050f0128e234894459d7de51e91881d65258d3067774cb7b109c11fc993bd297a59ebf
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf