Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe
Resource
win10v2004-20231020-en
General
-
Target
07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe
-
Size
996KB
-
MD5
00a64031ccd8733846466dea12158c7c
-
SHA1
9b3b5caa298aa64380180b9efa278e2c7ab4efda
-
SHA256
07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf
-
SHA512
63ff6edae02a31f0bc60f868ea93b5a3dd3a7a7d8a3a4baccdec499e9f3b305ba0ab22b64ad9f83bb3c15bb232b83334358872c3bbac6ec60f55f9d1a0f797c6
-
SSDEEP
12288:hIH6o6G9WkgLM7E8kfpuNuEXPCyMuDil6qP+QyzvwVwXTdH9cG3GuiC:CVR91gLoEdfp2MuDiQqGJwV8H9cG3p
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main 07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec529030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47409000000010000000c000000300a06082b060105050703011d0000000100000010000000918ad43a9475f78bb5243de886d8103c140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c00b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f00740000000f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f20000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 040000000100000010000000acb694a59c17e0d791529bb19706a6e40f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47419000000010000001000000068cb42b035ea773e52ef50ecf50ec52920000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1764 07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe 1764 07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe 1764 07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe 1764 07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe"C:\Users\Admin\AppData\Local\Temp\07a1f3cdb93181e2c359b03ee187ba85049aa141f5be2a7bfe8eae005c82c4cf.exe"1⤵
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:1764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52064539c44ac352a3f659d4474b9496e
SHA1119b72230e940a93911a76636d8a4cca35636d64
SHA256f763eda28097d36908d06a4a5e2fb04a6e4a413f87073ebf236f18b965429b89
SHA51207af6ccfdeb593d986211015b340d4e82d2543e0ed54060679ca69baa3b334252e49f57938467566518df22eb806523f888a8f59efd2b5eace154c1045dc9417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592cd0b36830038989543323cd489f34f
SHA13e00d9511ec6b1bf5d3327524fce00b2675ea276
SHA2562013739e93016a48f25e1e770a3280f05fc2102628b48f07ba4b281a3b9f1493
SHA5120eaaf633293fe2cc7e4123906f2c83082f41f26f9a7fab662b496ba82bf85d059b8c76ee29c213080e14a44de74cc1e54e6c5e49285d767a8349c99f8915b765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5912eb7a94df15b56a21b60f37c9b3842
SHA158b6bda0320ef790b909dbafc426436e85fe2e58
SHA2560340abae4366bafcc8b78437afe341ea7d117359043db965eb4bfe70108c2135
SHA5123c0ef5f760c418151af8e2947f6a7e7df15d01c4a4129e922a33c942e54dcfce3e788309f3b5e7cc8281f7be4481ec213aef9316cd8c52c2cdfdc57cc3acc904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15b7ef8c2d7d8eef4d3ac845648081f
SHA1b225dab73bf504f56815307e11361cd5b95c1ba8
SHA256d2080d854535383b456e0898a2ec22d97ae98383b03ddaf65527abc45df1a4d7
SHA512f3ca6bc892b02fe185d837d3b35b26c1beb2e1dd3230e053acd989a541759d51002a779ee168dac36048612c0a45d5f01c1d9e38c4a8b8d6a4b6c5ee55b023ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555952208c99b7cf7ef9941c8c82e7fc
SHA10ad398bf8f21b609a83713c6a63aceb9c457ad11
SHA256a2f53208a4b12a84253a3b961783889093abc7ba45f2abb0ac2f383ccaecd391
SHA5121281cccab517e77469b4fa1a830a604082df3104972dc063e512fff46f788ce3e31f03c9ccf37519f0161965da0fb14fd482401163cfa03d50324e92d389342c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e12662b4982be88f17800812dd12cb
SHA13a13df7230751bc5ae86b3f87af445c7a3d8e3c6
SHA256a09940d07ad7fdcf02cdec88307947b81efbd3df1d814bed38858f2b333584a3
SHA512589017c728de3ab8dc8257144f2ed758677f560da3aa574f91b7c302b66ecd1d3e249f993002b8239ce3614aab0d3ca61a63d84113d451a8f270d48ab182d9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508004ba434bb1c3236d0b5d9f20810df
SHA1aaddeea2f0f1b3e23b4c9a77268d252e9d696ef9
SHA256f9405a7d62ceced7a134aa10aef8c0e068511834b04fc50b4ce83c165b81c9ea
SHA51289adb0a70db7e5eb78d60e9fb8e5edc59af3804c080191fbe851ecc7522ea723e8f425102148187a202e482b84fd7552d3a6a37cbbc9a80859b36af116cf8b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD5ba19af3beedfca7395729137b6f902f9
SHA14adceecdfffd8012c1e844036b254ee131b4c305
SHA2564a8fd55d204f8cde905c55540a34237da8ec4b989869c424bb7d90929ba624aa
SHA512b67843b99613128c762a1a3ca92f90b161854ac13a729b7fa6f3414276122ff4428e6d81a6881e1d94e1225c7f4068b509d68efb02a1d1e9d1d8682c08258394
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf