Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:24
Behavioral task
behavioral1
Sample
0e8fa8f150721023ec992b47f0262487.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e8fa8f150721023ec992b47f0262487.exe
Resource
win10v2004-20231222-en
General
-
Target
0e8fa8f150721023ec992b47f0262487.exe
-
Size
38KB
-
MD5
0e8fa8f150721023ec992b47f0262487
-
SHA1
711bb6ebbd7f70cab372547bf9cc3f4f2e288ad9
-
SHA256
73f18de963b5be69d773f952ffeb892020f30795750d554625572820db6ba995
-
SHA512
d1e1eeef1cff7d42173fc95975e2bdd14136db394d7ca57482fcc6ef761e763d93cfb92496130bf01404b90b822ebb12e1bb63f13005f029a95e8831b35ad733
-
SSDEEP
768:vGpZaPDR881wsYgFrTmz0qH/LvGKWv9T6rU:OpgRFW0rTWHjXrU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2228-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2228-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" \DelayServices 0e8fa8f150721023ec992b47f0262487.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60178ec86937da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2CBBFF1-A35C-11EE-9075-EED0D7A1BF98} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000dd211488b7d602c8570d5611744e94352e626442eb4ed9bf4848073fb8a49eae000000000e80000000020000200000001cebf174a13167a72b6509ee776f86e20414c76d9eb4105b38e91a73e6c18a1c200000006aae0b7eaaa711f1d7b333e7a998eeaebf4511f9708abf682741e861ace0e7d0400000001f8fe1c5bd3fad234dc6271615370f24f37238f62b6ea31f7aadcfa1f4f465b954b1a8fd69b9813eb2c49357fb554a0a7f1ff5f29dcc245dee340cafda75fdcf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409694885" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 0e8fa8f150721023ec992b47f0262487.exe 2228 0e8fa8f150721023ec992b47f0262487.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3028 2228 0e8fa8f150721023ec992b47f0262487.exe 30 PID 2228 wrote to memory of 3028 2228 0e8fa8f150721023ec992b47f0262487.exe 30 PID 2228 wrote to memory of 3028 2228 0e8fa8f150721023ec992b47f0262487.exe 30 PID 2228 wrote to memory of 3028 2228 0e8fa8f150721023ec992b47f0262487.exe 30 PID 3028 wrote to memory of 2872 3028 iexplore.exe 32 PID 3028 wrote to memory of 2872 3028 iexplore.exe 32 PID 3028 wrote to memory of 2872 3028 iexplore.exe 32 PID 3028 wrote to memory of 2872 3028 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e8fa8f150721023ec992b47f0262487.exe"C:\Users\Admin\AppData\Local\Temp\0e8fa8f150721023ec992b47f0262487.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.download787.com/sanity.php?1=167984-100012⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55151fb4064c2f52efd3f274e9a5f7d13
SHA1566ada3401f53582366691a43a9496e74ebdeef8
SHA25628b1a599e6ce6fab420fc9e375e862c58f8ec92363aad6aa776aac341bc39d68
SHA512f0ef1f04ceb8b1286d5c1f3a80d6f81a847996fb7e997471e3ad19266a0c0a9d95d9545cf5e94808a903f51a4ea3df4fb33f6bcd868ad0b4b0e2b9a3a949f78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5176bae165b6b31cb94d4309e22e34f92
SHA19e0f2808e93bf932c049c2bc771cf23eabaa6406
SHA25666a09335d9ae826e598d55126b471268d18c4dadac2da4e2faaa62d14f1fdc4a
SHA512987aa3303b9db7c00a70a3f68fa61a86b14802e1b1a2a835bceafe36ec7b151572939ce68d5aa1ef2aa7cf1e3a73503a16e519582d36b2703f8d5083a46aa5fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1987e92c89896291c4ebebba811d056
SHA19108e01ee156d62571f726b3ee981b114ec56e7c
SHA25664180ffb9f4261552d87d09c9998acbc7e4bb933ae52e85beab0b73c4b6e2e2a
SHA5129f2feed8c86864d56362cda8239bc4d136bd1eb4c7c518815df39352bf0a05ec754e2c0933fc59b36cd3a56495f006a68cf6f5d53ca4e3f163b15d061cf7c3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a0c1415f0a959af90f8b110a223fc8a
SHA144ebe4cc242ff94a4b556a25c5b9d7b026699c0b
SHA256819b193b16fc53d5743dd3f64908a893bd7fa4d1af32796bd6771fe6e38659ca
SHA512db35dd1a3c227598ffd8a0522fd7c0a39ae78b0bbc54511253f4f69a7aab4afcae8cc10995246a82648786d322791f10ccb69ac1548ffcf38a35093cbe82f5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd768ec41561330e5a4264298620cab
SHA1e4ee5996b8678f4267dfba6c0e9333f3232c045c
SHA256d643ac61419d779552f4118d74fc61251d7b938b231ec7749b1c666d71273cf9
SHA51267a8b9389685c97847d5ef762633ee5fa112d742f2e369608e201c3e23ccb4eb4b67e8a1ef632220a83b12c6036797b0ee5f5da4b1144854da650de7ee670e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be383bdb55ef592dc9f3cb69e9f2439c
SHA1140fd464e2a37c14f50ec0e808f8ac29c600b26a
SHA256d781a9c17bb294bb15cde686d3a46b80403696c68b140a673e28122c03433114
SHA512abff28a9f4d41839fdd95d3161bf407d7890cc9fad386f0ea58a05af57b1bfa1c190dab1baf60ddb07d8dc54a2606e985e09af041e9268982143e1fdbbb7437e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa1a450ad8ec6ceae70ab2648891e67b
SHA1dc49e0c952f0f64cfd3737b46dcc3152b6c25009
SHA256f65981d96ab6bc4cc98265e2fc8e1ded55f06ecf997054ccd8ac797b306943e2
SHA5127d2ed0dd17983d943b4adbab3178fba2063bc5e3048392607155a22859fffa3abe5bff00a40ae236a429ab3b1eff449c9c9b28f0a4738399d154fa3b65050370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2d66bf524dd05b2335537058cc4493f
SHA12d4aba72f8de63d9b44ec5007cfbd5532423716b
SHA25652c51fd86748a83ea004252bedb41cfc71553aab3f56c8eea4c8d773ec8991be
SHA51225c8ba0b540a1382d23cbb5659bef4039564835b70aea66c2782f48ebba2a662cbcccf06717b1ad0b0439952ca7b5669189b3d6323a3e937c8b6b5cf36ac221f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e16c39a132c372411bf4096a40c3f31
SHA134a18eef548848047c871dee8de3cd77ccf61455
SHA25654f00cec73ea5ede20fc7b53172e33d22d8820ea6bfc0a31f95021bb702794b0
SHA5124a7bea000418f35885ce8cafca74332e7a0348da2f79b8ddcc4a7fb3b78c4b82b08e2a54cc6bcf64f614fed95748b306a8025073938463b5a67b4ff05b5f7bdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5222c8e85f949906993f2b9b778bf575b
SHA1789cd059aa70676fab2eb8d57b33df2d9134d560
SHA25693048a8cd67f8db130e66d0c6d0b404857fb59608de6abfbcb5d73666a0c0a85
SHA5120127744a4ba5e479780d5cad0311a9c344849dc86dfd2dd77a09c5cd57a8ba35e88dee98e752dc8fc463f6d638702ae2b88a73d1ac6a19646dfe4cf15c46eca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe7c776ae3952a394119bcbe7b292e38
SHA150f6481a2a0c15e4620c0ec904439c5a481093c0
SHA2564f26404ae71fe65b552b32151de6f4a06f0a5d72c84d1b5c34d9df0923f65a7c
SHA5120dfe036074fb137056e689569ceae577fd265d322146ef5b50c108459a9e34ffb56b90b189e2da3efe62f8707972b0217aa85cd5edd9f80b73b0b7f658493f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3190398f8ab8649861f8198030d3e3b
SHA1db670177dfec2889345ef4bd2a85adb3b5aaa8ef
SHA2566b0a555e5c7c5364d395c6290fe998453dc6792a5e06c222af8bdc5943774d8d
SHA512aec6f3483055f431e206af8e97d074e0bd6872e9e83c7b30372dcc7cc9ef207269c4fa0664306fd913867a2d8310047e6545f4e4af64ba2748d1619b34391363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c10bc2b88d62a70222a68cfe43477354
SHA16885f8b8e4316648bec3edca05f2f4a1927db919
SHA2566c7b8ddfb43ee0ccd9c2ea3c2263c9ea6ef61b295fc04e50ea168d8382650b07
SHA512f44fff1ad90edfbf0bf3eb3376dfc1a35c8e0723f18c0d43e20bbeecfa43f347159523688cd098e71f818743722a2bb8ef237087e625aa0dea87b4f2100d3335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58337cb2158a9a26c452d978ea1dc58f3
SHA1a692aa97db639fa831411bb0983b72f60d6580b5
SHA256c8b6c597d19c86b9f09c58e628a62094f696e8a07675f3d0d13831e15c141446
SHA512a8ac5f389e7d31fba51f75d121263e5f9d42fc9034832be9b2d3cedb6b42d6ce78a08960460c97de77d1ca4d882a44f1ddc1f86dcdf4031f9ac363e96793d819
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06