Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
04a47d3ff527137f9f69e5d6ef82aecf.exe
Resource
win7-20231215-en
General
-
Target
04a47d3ff527137f9f69e5d6ef82aecf.exe
-
Size
170KB
-
MD5
04a47d3ff527137f9f69e5d6ef82aecf
-
SHA1
b1f09d5fa2ac23d09560ee25be123bbc4766fc5e
-
SHA256
cf26d109210faef7d11e7f953e33f4b822624f5c8550fdad723bb63ac915a4e8
-
SHA512
eb76cfbbf9d5064cf57628226cd5f61a807c163ea2279bd78087863ff62813c7c6dae8799e0cff7a5e20cc5a770610747f8c819928f71a2bfef5a302a26177da
-
SSDEEP
3072:rFbZKoyQ4KBI1Jm1ozz7nFXpVcU1qboubhq8j1icx3nhtn1R9J2tGt50QiQ:rPKjQb1uFjcUuoikO/x3hvJ2ktEQ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\000054a0.SYS MIS_842_0.EXE -
Executes dropped EXE 2 IoCs
pid Process 2504 mms_842.exe 688 MIS_842_0.EXE -
Loads dropped DLL 19 IoCs
pid Process 2924 04a47d3ff527137f9f69e5d6ef82aecf.exe 2924 04a47d3ff527137f9f69e5d6ef82aecf.exe 2504 mms_842.exe 2504 mms_842.exe 2504 mms_842.exe 2504 mms_842.exe 2504 mms_842.exe 688 MIS_842_0.EXE 688 MIS_842_0.EXE 688 MIS_842_0.EXE 688 MIS_842_0.EXE 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe 688 MIS_842_0.EXE 688 MIS_842_0.EXE 688 MIS_842_0.EXE 688 MIS_842_0.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F} MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\ = "vyuv" MIS_842_0.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\000054a0.DAT MIS_842_0.EXE File opened for modification C:\Windows\SysWOW64\lãèwÒàèw úá rundll32.exe File opened for modification C:\Windows\SysWOW64\ÐRLöá rundll32.exe File opened for modification C:\Windows\SysWOW64\þÿÿÿ$béw4H rundll32.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\bhae\flei.dll MIS_842_0.EXE File opened for modification C:\Program Files\bhae\djcg.ini MIS_842_0.EXE File created C:\Program Files\bhae\iohl.dll MIS_842_0.EXE File opened for modification C:\PROGRA~1\bhae\yexb.ini MIS_842_0.EXE File opened for modification C:\Program Files\bhae\agsd.ini MIS_842_0.EXE File created C:\Program Files\bhae\yexb.ini MIS_842_0.EXE File opened for modification C:\Program Files\bhae\yexb.ini MIS_842_0.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B79A8E3F-D7F8-46F8-9F22-F907D62A93C6} rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-78-bf-a8-d2-56\WpadDecisionTime = 909112979036da01 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-78-bf-a8-d2-56\WpadDecisionReason = "1" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B79A8E3F-D7F8-46F8-9F22-F907D62A93C6}\WpadNetworkName = "Network 3" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-78-bf-a8-d2-56 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B79A8E3F-D7F8-46F8-9F22-F907D62A93C6}\e2-78-bf-a8-d2-56 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B79A8E3F-D7F8-46F8-9F22-F907D62A93C6}\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B79A8E3F-D7F8-46F8-9F22-F907D62A93C6}\WpadDecisionReason = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0109000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B79A8E3F-D7F8-46F8-9F22-F907D62A93C6}\WpadDecisionTime = 909112979036da01 rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-78-bf-a8-d2-56\WpadDecision = "0" rundll32.exe -
Modifies registry class 43 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist.1\CLSID\ = "{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}" MIS_842_0.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F} MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067}\VersionIndependentProgID MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067}\InprocServer32 MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067}\InprocServer32\ = "C:\\PROGRA~1\\bhae\\flei.dll" MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist\CLSID\ = "{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}" MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu.1\CLSID\ = "{716EDA00-31C9-4B5C-9201-F12A858AE067}" MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067}\ProgID MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\Programmable MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu\CLSID MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu\CLSID\ = "{716EDA00-31C9-4B5C-9201-F12A858AE067}" MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist.1 MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist.1\ = "wsvwho.wsvwssist BHO" MIS_842_0.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\InprocServer32 MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist\CurVer MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\ = "wsvwho.wsvwssist BHO" MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\VersionIndependentProgID MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu.1 MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067}\ = "wsvwho.wsvwssistMenu" MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\InprocServer32 MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\InprocServer32\ = "C:\\PROGRA~1\\bhae\\flei.dll" MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist\CLSID MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\VersionIndependentProgID\ = "wsvwho.wsvwssist" MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\ = "vyuv" MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\InprocServer32\ThreadingModel = "Apartment" MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist\CurVer\ = "wsvwho.wsvwssist.1" MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu\CurVer\ = "wsvwho.wsvwssist.1" MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu.1\ = "wsvwho.wsvwssistMenu" MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067} MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067}\ProgID\ = "wsvwho.wsvwssistMenu.1" MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F} MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\ProgID MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067}\InprocServer32\ThreadingModel = "Apartment" MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067}\VersionIndependentProgID\ = "wsvwho.wsvwssistMenu" MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist.1\CLSID MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu\CurVer MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu.1\CLSID MIS_842_0.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{716EDA00-31C9-4B5C-9201-F12A858AE067}\Programmable MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssist\ = "wsvwho.wsvwssist BHO" MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D1C9C39-40C2-455D-9857-FCD4985F4D3F}\ProgID\ = "wsvwho.wsvwssist.1" MIS_842_0.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wsvwho.wsvwssistMenu\ = "wsvwho.wsvwssistMenu" MIS_842_0.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2504 2924 04a47d3ff527137f9f69e5d6ef82aecf.exe 29 PID 2924 wrote to memory of 2504 2924 04a47d3ff527137f9f69e5d6ef82aecf.exe 29 PID 2924 wrote to memory of 2504 2924 04a47d3ff527137f9f69e5d6ef82aecf.exe 29 PID 2924 wrote to memory of 2504 2924 04a47d3ff527137f9f69e5d6ef82aecf.exe 29 PID 2924 wrote to memory of 2504 2924 04a47d3ff527137f9f69e5d6ef82aecf.exe 29 PID 2924 wrote to memory of 2504 2924 04a47d3ff527137f9f69e5d6ef82aecf.exe 29 PID 2924 wrote to memory of 2504 2924 04a47d3ff527137f9f69e5d6ef82aecf.exe 29 PID 2504 wrote to memory of 688 2504 mms_842.exe 30 PID 2504 wrote to memory of 688 2504 mms_842.exe 30 PID 2504 wrote to memory of 688 2504 mms_842.exe 30 PID 2504 wrote to memory of 688 2504 mms_842.exe 30 PID 2504 wrote to memory of 688 2504 mms_842.exe 30 PID 2504 wrote to memory of 688 2504 mms_842.exe 30 PID 2504 wrote to memory of 688 2504 mms_842.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a47d3ff527137f9f69e5d6ef82aecf.exe"C:\Users\Admin\AppData\Local\Temp\04a47d3ff527137f9f69e5d6ef82aecf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\mms_842.exe"C:\Users\Admin\AppData\Local\Temp\mms_842.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\MIS_842_0.EXEC:\Users\Admin\AppData\Local\Temp\MIS_842_0.EXE3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
PID:688
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\PROGRA~1\bhae\iohl.dll,Service1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD548e6b3c7c381216ecc744766ebce733f
SHA1a9e59cbea13588244c1a595b96004a156dfc1b15
SHA256bd71efcf28ac1f5703149e3c513884f899169660c07d3b38de128df19fa9a7e5
SHA51241b34582b5802ca142e28246c441a63af2dd064b45e205c8344155554bc179a5b8327950d578e2bacdfdfb65e9569243162099cd31da49ee681c50e83e0bde4c
-
Filesize
170B
MD5d2811f5b48688e11101895544aea1db4
SHA1b8adb163103782d743f8362e8f8c7352a6b689eb
SHA25652cb7172d1e263eefc8108cceed3db3641ce5e46f2eace20df57c13fb746592a
SHA512a8946977c3e79e17af77a923377819fd80a1f230ab353677479a1496e3d1718e0962f9cbd39418787ae9192f64d039dd35b3584ddaef77eaf4dfc8e8f84d6b0d
-
Filesize
136KB
MD5b8da817f1a45e4a4b4558a00850e4ec9
SHA13c664c8cc0be885c83c827f257ca46e80fc459ae
SHA2562dbac9dc27c0c89c389246158b00a5bb90bbbd0d17181aea796dd6813186ad42
SHA512a9d653f35e2f3e4eb3e70f40b900adbdc7ddcad4960a2e4435170e4c0a7658f2a72456a2c00bb687a69dacbf97813e6d130677da094c6bbe3c2c75f3a1e095d0
-
Filesize
292KB
MD53aa1f59d957eb88623ec689e51782c39
SHA15d5a2a1233c21da874d374ef0ab4ad216c28efba
SHA256a470cc4d234fa12304d4df0604ffd93c64631af129031385e1242d9e7338876d
SHA512e5e50336f7c19c7b15f902ee6903151fab22562c55d3208cfa5dff2591430bba18231d979ad8c169ee47486de586267c48236d567883c636b2eb7802f5ffb1a6
-
Filesize
128KB
MD5082516a1315529c41be2ea45efb992db
SHA1475cbc1f34eb85e723b98a89c31714733cc0320a
SHA256c69a1dceaf4fc08d2f27b928968b5665a75eb9733d7a0376d07aac6c67b88d54
SHA51206f40cdafc48e8f89630b2dc70b8545c761333816d200bc57d70b1dd92108be259fdbd50f0a48ee4cc947b11799e6ca2b00c139f73f7c8c3f0a2d2554ed2ca87