Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 02:05
Static task
static1
Behavioral task
behavioral1
Sample
68b119d0c8e3bd0c0d72e4f1cca7bf78.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68b119d0c8e3bd0c0d72e4f1cca7bf78.exe
Resource
win10v2004-20231222-en
General
-
Target
68b119d0c8e3bd0c0d72e4f1cca7bf78.exe
-
Size
38.1MB
-
MD5
68b119d0c8e3bd0c0d72e4f1cca7bf78
-
SHA1
0270ddf5a8de7ebfd881e3efe416e7f050e10f3b
-
SHA256
aa01b61e797f3bd5baedb4e7f8133247514af0c8385de101e33d081f863b3194
-
SHA512
3a74102bffbffa7d11cccfe7cf63ff2022cf320ac810a7703a18eea8865f721e33c90b642405bcb67459c4534d384259c0dfea54f2062ea6e610029bfc4af736
-
SSDEEP
786432:BHFbz9TK5pnE1Y684f1dS4PEJFTERfvMYG1aEytK5pZnxgE1YVz92auotQ:79TK51Ei8f1dS4PEPMcYcvytK5zn+EiA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000da313e7c4aa40bc6331df5775e7cc813d5c7f2ec1f52e223df3521e7db8982ef000000000e8000000002000020000000bbec105bd2b5e4a11b54c614c9ba22335b8285fb7f177b89833fc71c36294a879000000073b63bb4d08ae03410a3a6238d7ab4b15ac0cb21e673bd26aff0483ddb2c7b14ed20a99e440895053a13e08d00faa9bd1f36ac8c34c02b7f698b585abf4d2ff948333213ee1d4a9239cd58d27b87ad0882cddf96cdc9479baabdbebe8f59ea2415f596132c06631c00f1d43c1e1237d2bb765cf3e661f884e9cf293f9b8370e09e5f66e06e3fcbecb285f988be47e0b74000000046087364a53b1b07a8211d776607f9c8baed0cf1446d68d301c638809412b2f45ec584e4a644f083e92c1cfca636af2ba6fd7983a1fa1af4c6f67f892a0ddc29 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ed7ed90d36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409545439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00AAF941-A201-11EE-A2F4-62ABD1C114F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000002e4a9b14212ed8f082515a4874aa0a3a30aa0034fe08a9f94890901752bf0b9e000000000e80000000020000200000002fc86231a72a07f0df4217b0bb70ad8bd4297efaf1c60c875e730c9f13442f2f200000008f66666d2a1de6a327d34441aa9e881d3a0d170bfa0ee716989d7efbb3bad3bf40000000f677ed292f1a16c85b6a9f91adf94ddcdff20a82ded96efa5120d9ed41850d0afac0d6087e05ea134290b802d7bd73fa7d56ddd27684e18bc0888e04f942f521 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1112 iexplore.exe 1112 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1112 2224 68b119d0c8e3bd0c0d72e4f1cca7bf78.exe 28 PID 2224 wrote to memory of 1112 2224 68b119d0c8e3bd0c0d72e4f1cca7bf78.exe 28 PID 2224 wrote to memory of 1112 2224 68b119d0c8e3bd0c0d72e4f1cca7bf78.exe 28 PID 1112 wrote to memory of 2168 1112 iexplore.exe 30 PID 1112 wrote to memory of 2168 1112 iexplore.exe 30 PID 1112 wrote to memory of 2168 1112 iexplore.exe 30 PID 1112 wrote to memory of 2168 1112 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\68b119d0c8e3bd0c0d72e4f1cca7bf78.exe"C:\Users\Admin\AppData\Local\Temp\68b119d0c8e3bd0c0d72e4f1cca7bf78.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=6.0.25&gui=true2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1112 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD554d8966c5d18b5c72345651e6f470666
SHA1d4bd68270fe005887b1b96928b3ce264ff0d285f
SHA25604e4c5cb3f08d305434c6078a542cdff542d8a33c4dd237e30ab269045799ed1
SHA51250023dbebba6b032c8144ad1869b29ff8b8f3ba3bc645620a66f918ac71fecc98a175f3abc0ef15d210fe347be20f2fce5cae787bf0243b553839ac5239d8ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f85230b946653d5cc60e10b72d2cfb4
SHA1975c0647f6c10b0a3f69a1089874753b48ac052f
SHA256b4d70966f0bb3ddea6f46e95873d4fb0cf920de95a13811d1b437954e25de45e
SHA51264718aca0ec6166a627617fe10042a7f8641b3a552012aed12e6da45fcf1951e3a16790b5defd15fa0f526d8555310a594a413aca1045978187da55718fbbeb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c67709bc93cb289f34342fe0b1013e8c
SHA147bab97f3446d60318c38a74f2ba236207a0a7b5
SHA25623c5969dd28d99f348ab7725cb7c0a99fd991c261c42195d9a7aaed1f2b2fd2a
SHA5125c4b56c9cbb6fbca28e4072644182bb8e2dbd6753df3e9709fa37cc713deee5078faef31c70b714d31684731b55cc2e361d585e696bba7092cb71fb7029a33eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552c1c1c263c191e17afa8d71e31503c1
SHA1e7704a5401a0531c637ec4c7295d3bbca0c91a7f
SHA256554b8f3aa1a24aeb1be43d988b7719aaa79c8593809ac6df7030f8a5f2537582
SHA5127443a797f4442d1b409f49d05fc6db1f59f67fe1e93580efc85caa45332c6ac2ba4a60cfc009831413a2673aac48db2885a1171d67b1731a3302aba92f026c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b00cf30f7529bc1fa39e5bdf1e479e1e
SHA16427782e5f2f19b63bf909455e70fccdc70aa5ab
SHA2564b4944aac67e60b89626252b79bab290e43419b6b14793de50162f76583eaa3d
SHA512fafeb8ed8fb759519975f8c1baab63623548a160859f1f28b059d614efe23cb627bf8f27d87ed26c7cb29a99a10102a2b8be5982581fee874625bd34e561a7d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63d742ff0e88299130bd2422141dedf
SHA11d5df058f36912218f8910cb73bb9606627dc718
SHA256efeead220414c307a6c4a77aec41638b4af782979a061654e555b6d224bf6b4f
SHA512321740e73a1c58ba023a734e059b7f355036dd61128abe005e7b987ad2ec4c66cf2778fb09e8504f854b395ee92a2b14ed8012c37c8c0615cf5906916a61341f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35e7a5e467425412891a8ef22ab4948
SHA1110f93cd5d6c7a0e097192b23036534bb985cef8
SHA256a730ba781b72790b69b90bb862fd5fe282d3e37783a3bcb2ee7a68152c2a1c78
SHA5123f46631ef468bde152df4ba3c1c0fc6b7339d46ceee83ea12c71a699a4597a2caa4cc0e08fe976c3f653e19b780370c53982831d0058625ee8c53ca513b690e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6dd04a60995d0f02910f2ad61c2826c
SHA1bc3e3cc07af8e8f7ba6a70baa1890e4fbe8d9aeb
SHA256f3a140b103126187acca108f0491c94318b7c9c3cb53e6196a2f362443f1910d
SHA512cf44c774445b40774e1d6f39b38322ff3123b1cf9cdd5172d64e6b8c8770a87594930a5edc8ecebad283964bd554c943392bc4bbb09b11bfe0c3bc77e0fb5046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742b654ec30299f8f52886ccd9a254a5
SHA1b197740e98ff0d16f306ddc52931527ff2002c90
SHA25634d5a82319f8323f85b1238e8cc14752660b35bb21b53030083254facbf6fe44
SHA51225af19d65ee0ce54457899a34124b0dd0b361e81b4cf2bf0c9e1a0588912bc041d0255f8bb160a4646596f4a34bb4385ba93e71d736352d8598498c9429ae117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4752e2484aa11b7ff0a5150951e9b28
SHA10b18a6fad24de7410848d6c2757b575a8eba321a
SHA256bf363262f76a9965ba4de39a19561a67e8c352dcdf111b0ab1c6cff19c378f59
SHA51215682bf018f57ed48040baf751861da5b515d451575e0d8f8703b72c993c496d3d77ca87493f098ed329f81d63eb58c770174a33d0c81dcf853816e0103181c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54745f103d739040983d755df899677b0
SHA1d310b016169210168e46d06f8bc9db7b29b9dd59
SHA256e3809342d343f018b8134e09892993735e738dd88081fc1d4c57abee20026efb
SHA512f247dac0a32b462cc1c85a0c5024de4680682ff5d275625b82f108dcc72e8a10b8af4209556bce3910c25f78f5c7d10125be3648d0d181c7826bdaf27a2b91af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5aca70b369bbde66f8c19c21d79d59eb2
SHA1af576df69f3fe7449c8b9bbff492b7b4af393837
SHA256539da39435ca0afa4a093f6a50ba06e564091465e31e549c253a3923deded2e3
SHA512b8970d7951cb94bad766dd630901f435964d68550253bbbd25607385fd28ddc85073110904974dc52a4937bcbfdf99a44320982b310912fb76a5e070575f58f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06