Analysis
-
max time kernel
3s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:04
Behavioral task
behavioral1
Sample
15eaaa2c0905d9b29e91547b082364c6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
15eaaa2c0905d9b29e91547b082364c6.exe
Resource
win10v2004-20231215-en
General
-
Target
15eaaa2c0905d9b29e91547b082364c6.exe
-
Size
371KB
-
MD5
15eaaa2c0905d9b29e91547b082364c6
-
SHA1
77df4a30d68453e2c4448136cd069014dd7e7a7a
-
SHA256
58dc625c75f42dbf698a8f1107070f62f81c0de9966958278b72dce185fbd5f8
-
SHA512
b3c6b9fd2fe22daf276e950200c9057a3b4ab9e6155821e2e1a82ae2af6520b4fa61b290acace395a45cd9520398096d32bcce9f761ec2c936d5267639465d22
-
SSDEEP
6144:OuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLKUezTN+94IkNkey+X:F6Wq4aaE6KwyF5L0Y2D1PqLKU4s98v
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3568-0-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-30-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-31-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-32-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-43-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-44-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-45-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-56-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-57-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-58-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-59-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-60-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-61-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-62-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3568-63-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3568-30-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-31-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-32-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-43-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-44-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-45-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-56-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-57-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-58-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-59-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-60-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-61-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-62-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral2/memory/3568-63-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{4C05C0BC-A381-11EE-BD28-C6E29C351F1E} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 1232 iexplore.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe 3568 15eaaa2c0905d9b29e91547b082364c6.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1232 iexplore.exe 1232 iexplore.exe 3856 IEXPLORE.EXE 3856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 3856 1232 iexplore.exe 91 PID 1232 wrote to memory of 3856 1232 iexplore.exe 91 PID 1232 wrote to memory of 3856 1232 iexplore.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\15eaaa2c0905d9b29e91547b082364c6.exe"C:\Users\Admin\AppData\Local\Temp\15eaaa2c0905d9b29e91547b082364c6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3568
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2788
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5ce3a501cbbfdc7a7844f8f779504a5e4
SHA15b32a366304b8c7a6496a7fb5c5b3f7bb87072f0
SHA256688c4e4dbd77b0dcaf2d4ea569734f008e26c4bc3fac256e86a74c86612e7663
SHA512651dea4a25e511ee43de9f1c227c6e2851f9e8e6381d2ba4363c564f7267ca01cfbc060c6d4ed69de5081b5990fce1aa8d005a093c42206bc4786a602a0f44f4
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563