Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 17:41
Static task
static1
Behavioral task
behavioral1
Sample
08f5d1a05d860f1fffe51c04ff266f6c.exe
Resource
win7-20231129-en
General
-
Target
08f5d1a05d860f1fffe51c04ff266f6c.exe
-
Size
24KB
-
MD5
08f5d1a05d860f1fffe51c04ff266f6c
-
SHA1
103d0d83cc61950abd9a165fb5c11e95c0128cf4
-
SHA256
cfe1db58d45cd01cf2362e48cd09c2f1a9d7a60b0ede7d6a7eb3c11bc33bfb1a
-
SHA512
6c10806f745238ed3d2373849ba9216116cc3a85e0f41a092ee616a1b4e93e3fa37140259ff53e2e1d4807f7b8efb981201acb3248b9729d7c7d2415c43812f4
-
SSDEEP
768:UbygN8hKoVctW0c+LY2U3XcxyyHTC0epVUtmg:9cqrVio0Ydjyr13
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 08f5d1a05d860f1fffe51c04ff266f6c.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 08f5d1a05d860f1fffe51c04ff266f6c.exe -
Loads dropped DLL 1 IoCs
pid Process 516 08f5d1a05d860f1fffe51c04ff266f6c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{547EC4B3-883A-4849-B86C-813148E35FC6} 08f5d1a05d860f1fffe51c04ff266f6c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{547EC4B3-883A-4849-B86C-813148E35FC6} 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E4F02333-AEF1-44AE-9D09-A1E9DC7A5299} 08f5d1a05d860f1fffe51c04ff266f6c.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\peoehf.dll 08f5d1a05d860f1fffe51c04ff266f6c.exe File opened for modification C:\Windows\SysWOW64\peoehf.dll 08f5d1a05d860f1fffe51c04ff266f6c.exe File created C:\Windows\SysWOW64\sqlnl.dll 08f5d1a05d860f1fffe51c04ff266f6c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\hosts 08f5d1a05d860f1fffe51c04ff266f6c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\HOMEOldSP = "about:blank" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use Custom Search URL = "1" 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Search 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "file://C:\\Users\\Admin\\AppData\\Local\\Temp\\sp.html" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Use Custom Search URL = "1" 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Search 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Search\SearchAssistant = "file://C:\\Users\\Admin\\AppData\\Local\\Temp\\sp.html" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "file://C:\\Users\\Admin\\AppData\\Local\\Temp\\sp.html" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use Search Asst = "no" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Search\SearchAssistant = "file://C:\\Users\\Admin\\AppData\\Local\\Temp\\sp.html" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\HOMEOldSP = "about:blank" 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Bar = "file://C:\\Users\\Admin\\AppData\\Local\\Temp\\sp.html" 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Bar = "file://C:\\Users\\Admin\\AppData\\Local\\Temp\\sp.html" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Use Search Asst = "no" 08f5d1a05d860f1fffe51c04ff266f6c.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "about:blank" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "about:blank" 08f5d1a05d860f1fffe51c04ff266f6c.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F97E345-693C-4BA6-B076-C56E76747681} 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F97E345-693C-4BA6-B076-C56E76747681}\InProcServer32\ThreadingModel = "Apartment" 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/plain 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/plain\CLSID = "{0F97E345-693C-4BA6-B076-C56E76747681}" 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F97E345-693C-4BA6-B076-C56E76747681}\InProcServer32 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F97E345-693C-4BA6-B076-C56E76747681}\InProcServer32\ = "C:\\Windows\\SysWow64\\peoehf.dll" 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/html 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E4F02333-AEF1-44AE-9D09-A1E9DC7A5299}\InProcServer32 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/html\CLSID = "{0F97E345-693C-4BA6-B076-C56E76747681}" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{547EC4B3-883A-4849-B86C-813148E35FC6}\InProcServer32\ThreadingModel = "Apartment" 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E4F02333-AEF1-44AE-9D09-A1E9DC7A5299}\InProcServer32\ = "C:\\Windows\\SysWow64\\peoehf.dll" 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E4F02333-AEF1-44AE-9D09-A1E9DC7A5299} 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E4F02333-AEF1-44AE-9D09-A1E9DC7A5299}\InProcServer32\ThreadingModel = "Apartment" 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{547EC4B3-883A-4849-B86C-813148E35FC6}\InProcServer32 08f5d1a05d860f1fffe51c04ff266f6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{547EC4B3-883A-4849-B86C-813148E35FC6} 08f5d1a05d860f1fffe51c04ff266f6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{547EC4B3-883A-4849-B86C-813148E35FC6}\InProcServer32\ = "C:\\Windows\\SysWow64\\peoehf.dll" 08f5d1a05d860f1fffe51c04ff266f6c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 516 wrote to memory of 64 516 08f5d1a05d860f1fffe51c04ff266f6c.exe 103 PID 516 wrote to memory of 64 516 08f5d1a05d860f1fffe51c04ff266f6c.exe 103 PID 516 wrote to memory of 64 516 08f5d1a05d860f1fffe51c04ff266f6c.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\08f5d1a05d860f1fffe51c04ff266f6c.exe"C:\Users\Admin\AppData\Local\Temp\08f5d1a05d860f1fffe51c04ff266f6c.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\eadc.bat "C:\Users\Admin\AppData\Local\Temp\08f5d1a05d860f1fffe51c04ff266f6c.exe"2⤵PID:64
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD593b885adfe0da089cdf634904fd59f71
SHA15ba93c9db0cff93f52b521d7420e43f6eda2784f
SHA2566e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d
SHA512b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee
-
Filesize
70B
MD5677931564938373367422e56cdf23934
SHA1fb077020992d9fa49a901d3b64c3d9ce5bb88b35
SHA2562d8efe1526fa203539bc77da8570b4cb38d5a63836a76d2379b7b506d0a67ee0
SHA512808e177716911a5b975449b55df4fe1fc97cdb929be621fe541a7dfe7dce3362039214fe1ab4760c4d67aafe8a12308d04e5a40dc028b848c154f3e3f2d120ba
-
Filesize
31KB
MD500d4bd9ccaaa70133eaaac0c1fc31979
SHA1577fcaf44328e2a585822171c6321db5f0901341
SHA2564a24d6ae5b816e2e2502b805f1d19bac857d67a64911acee4a211c864168620b
SHA5128a79c36ed3bd5eca6bbc53c46b43189702acfc69743e9f1e4b849d08940d34eef1a0d00b354da7252a8e877e04716ceed42a6e0c2237044c2a836b0afcab742c