Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 09:40
Static task
static1
Behavioral task
behavioral1
Sample
14ce9bd59860864879744834db2ccf72.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14ce9bd59860864879744834db2ccf72.exe
Resource
win10v2004-20231215-en
General
-
Target
14ce9bd59860864879744834db2ccf72.exe
-
Size
700KB
-
MD5
14ce9bd59860864879744834db2ccf72
-
SHA1
750cfa506c8cbae2c48108380ff92e367e9741e5
-
SHA256
e5b7672b0772b4a865222e749a581f4a2a897fc9ff3d4b8ad3802b1f32d0a011
-
SHA512
64cdaa7d63530778c19f643480e0aa0025edf0d1b05a15d7cbd4e331174095e7d3686af78d7d79b01d2f873d845cf30785ac26caaa536eace185a298f7ad85db
-
SSDEEP
12288:DP7QqeEuT4CkjeSKbh+D7F8T5a8uXs9ZI68n:DP7QqeEuTOsbwD2T5a86sbW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409708427" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D9A04B1-A37C-11EE-B494-6A1079A24C90} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2288 14ce9bd59860864879744834db2ccf72.exe 2288 14ce9bd59860864879744834db2ccf72.exe 2288 14ce9bd59860864879744834db2ccf72.exe 2252 iexplore.exe 2252 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2252 2288 14ce9bd59860864879744834db2ccf72.exe 28 PID 2288 wrote to memory of 2252 2288 14ce9bd59860864879744834db2ccf72.exe 28 PID 2288 wrote to memory of 2252 2288 14ce9bd59860864879744834db2ccf72.exe 28 PID 2288 wrote to memory of 2252 2288 14ce9bd59860864879744834db2ccf72.exe 28 PID 2252 wrote to memory of 2716 2252 iexplore.exe 30 PID 2252 wrote to memory of 2716 2252 iexplore.exe 30 PID 2252 wrote to memory of 2716 2252 iexplore.exe 30 PID 2252 wrote to memory of 2716 2252 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\14ce9bd59860864879744834db2ccf72.exe"C:\Users\Admin\AppData\Local\Temp\14ce9bd59860864879744834db2ccf72.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://220.ys168.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f51760a76077c5828b02b1f035bc75d
SHA1adead5b650456994c51d3c03ff392d950e36025e
SHA2566c1ea856c170d47bde030a8d4daee168bbc2f59c001268e604d98845d6e5f74c
SHA51200d8b8ab95c470307bddba5a3effef7d4731764a2ce243b54b2b575b11a34e3a638d8c7a40f4dddfc76288977b2a6102227a72c11bc894d762b2e47f02119ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c05d5c1136596a9873565a1eb602e1
SHA147cc64ee69e402e206d56a38abf1a2fa284cb2a0
SHA2567d67fd0c20ceaa639e772adf3c2a61fc9b090341f4b5e57a8785ad353cfe3c2d
SHA512033a93af86c9785bb604dac59d02bcd71f11899b9e02c06a89bd9780a3991e93efd5a6c3022a4ecbb7c7cb7f01a33b81c9092e49ac238ea08d9b76895d15f114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561dacbd0b4d3106f4dd1641bd46feda5
SHA18bc773d76dfbd944742a03916ac820d2e032aa2f
SHA25699d65740baa013c12b55e721f61effb41e21d986778d8edb5276b4c2e7c1e7ce
SHA512d2de0b124c5a5676ec5c63d3355250ce4e3a4b362ce16d39e436d09feba5a354751da67bfa9d30a84057089343c3ad2c511a575f8ac10bd4b09077ff79186b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b29def61a2ebdc42e5934bb5bcdeae0
SHA113a9118db6b66573cdc1a5c2174a2ba85a40cf89
SHA256ba99d6896d9864f050f70680a45bb405b8d0786e659914aecad364ae50997d29
SHA512fc3695851d4c5876f81eb0b8eb1eab421e4a6f3ea9222f85828c6b80524dfa23293835264bef8490f7e29a1e27e500b5795fd666ce67f2dd7402f985832e4edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549bc37d7f793e08792efebc91d47e200
SHA150c5d965bf7fe3d422aed61ba9b2fd6bf3b4255d
SHA256b073429bf1f982987e9369a6d7e3949827511dcc807076823d1cba2fc6cc6001
SHA512f2704c46fd64cbb06427d445af1ac47075c8fccb5da1aa353a04976a084d35503326bbb784b998e47df7a27f24a97e81f64020d46d67856ce0af32ed25c9e5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e2d01adfe3d50fc9d4126c3e245c94e
SHA1316a4b5890586df5cc97e5cbdac39ff88fa7765c
SHA256c174a5bd40e4af1be2ca48830a8dcbef3b535b3cfbfa598c266a2fc072215919
SHA5129db06ffee23c211f86bb8131ae16ed6a5f851b5f5c9972d6380aec3f28a4f64fe42cd015c76eafd95e62137fc2ed86cac3b7fa32494924b46b6921bdc05eff90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51321e295ebb2a0664d838e3fe6eab6e9
SHA1b78f876b88239554c5fc09817b7d634962339554
SHA256351cc1013273160cb253ce82cd6171b571c915d96f0784fb72ae0cec3cc2f3b6
SHA512f1a5721540699f16fb139a4003b20ebeba332d233bd93c81d6031e243865d8cd9c165fc1eda9df5a18b05e9308ac81935e03e311d8901d24ddc7e497f71f0047
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06