Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
205b0ffa7ff49fa1322520187a76f1e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
205b0ffa7ff49fa1322520187a76f1e2.exe
Resource
win10v2004-20231222-en
General
-
Target
205b0ffa7ff49fa1322520187a76f1e2.exe
-
Size
22KB
-
MD5
205b0ffa7ff49fa1322520187a76f1e2
-
SHA1
d14e7a66168923a0c545951e636d792376882ede
-
SHA256
f004b00d694636580108474b2e8287bfde8592337f16220aac12d6a02df228bc
-
SHA512
8cfaf9c569d6b219682cfb8bebbd0ebd5a68ab485fce3086d715b4b69e1c15c4478e991f607844c82c942fb693d0e79c13f4ad2e162e9ee8a652f53a2a7ffa4b
-
SSDEEP
384:VlmQbikcUXPWN+strmAiQDJ1owhNhVo7m60+pb5q0E9kCnxWlBiTKYVYzfDtEa9O:TuFNmABNNh6m60+pbofk7iTKO4LtREYM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2996 2088 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409916825" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A90415A1-A561-11EE-995E-62DD1C0ECF51} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000003b261e8b33dda99f70cbefb796df80e875e733d6537fb3d2ccae8910db1593b9000000000e8000000002000020000000b48d986b56fbfe90b8490a78b2019f75e400f8a59801310852f7e1ce9a06d761200000000459c5b3d62e71f6c8a5eba3761130d5a2ff179126e38d8ad0ef4c8626a43f91400000001e935d8d372099641179deb39df892cf155c25e6a5878c601b56c9b3cc64c777c198ea33fb4db80337e1ad477e4b51d5163ecae16b3b4d56c1b8ce180a4229b1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10360d8d6e39da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2500 2088 205b0ffa7ff49fa1322520187a76f1e2.exe 28 PID 2088 wrote to memory of 2500 2088 205b0ffa7ff49fa1322520187a76f1e2.exe 28 PID 2088 wrote to memory of 2500 2088 205b0ffa7ff49fa1322520187a76f1e2.exe 28 PID 2088 wrote to memory of 2500 2088 205b0ffa7ff49fa1322520187a76f1e2.exe 28 PID 2500 wrote to memory of 2708 2500 iexplore.exe 29 PID 2500 wrote to memory of 2708 2500 iexplore.exe 29 PID 2500 wrote to memory of 2708 2500 iexplore.exe 29 PID 2500 wrote to memory of 2708 2500 iexplore.exe 29 PID 2088 wrote to memory of 2996 2088 205b0ffa7ff49fa1322520187a76f1e2.exe 30 PID 2088 wrote to memory of 2996 2088 205b0ffa7ff49fa1322520187a76f1e2.exe 30 PID 2088 wrote to memory of 2996 2088 205b0ffa7ff49fa1322520187a76f1e2.exe 30 PID 2088 wrote to memory of 2996 2088 205b0ffa7ff49fa1322520187a76f1e2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\205b0ffa7ff49fa1322520187a76f1e2.exe"C:\Users\Admin\AppData\Local\Temp\205b0ffa7ff49fa1322520187a76f1e2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.google.com.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 7962⤵
- Program crash
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c048f2a842551be590d592d1f030d7
SHA16322183d63707856c36947446914e20ac11971db
SHA25681eedef6edf96a2bbf8b06b95f5738a77cd2eb33012ae46f34ebb4a2515275e8
SHA5121e04c8ce60825c1b27d22a94a7436c7a94b18689ddc0d38a0735c871c4a6faf8c0b911ffc652df9005b0924d3cff299ac007370a44ffcce697764b68b27abb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51db23e2c4cd9afa3214d9e2572cf0993
SHA1c8f6cab2e4427fc1007ceb96eace1a62b702b686
SHA256607fe8ae115e289daa18f9b18f72720fd4561ff2fb0e7aac77b63bdaadcf920c
SHA51274d0a77ac727c9248648f0af5e5bf11069454b9b6482a9cf33ecd0ebccf96b858a3688846959cb765b055225f9f7406aa97f8e31a2fc71eefa623277e664ab25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5118a454589aa7dda18f12ccbaa7d7ceb
SHA16493ff304b5a190a4f52f6913a952709c68c4ac2
SHA2562e4789c422f3b29d68375081ee18a493cb6eb75ed361e5a1ae14b47d3443c140
SHA5125c0568afc04b50eca5c1a9bb3d943a003e4482d913701514de0fb323974aa1a8e4aa4092d15be345dfae8a4acc0efc43751ab37ac8128a0634ce3b0c5474b454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8c880b288ae339564f70a91f691692f
SHA1078291d47f134e496522406b74adea262030f948
SHA256fad7beaf3318408973790b0a5594d3feb19e6b7732dce78710aa66b31e62de47
SHA512bef511de0653fc09f039d848f742b107d7f5a4055194819af3cbfa0105b364f846f1bb010b7200382590eb514008ec676b64a3aabf2000cf04ba1b46100dbc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c920eff7bf4c3f4c2bfdd7d4fd397f7
SHA1460acd109a1135bfd69341644c7692832dbee3f5
SHA2566a84bd9ff8c4b8ed27dfa858053748220e706a5a18bf9d0cd8d2927f2c179935
SHA512e8648d1a47b991b01d274eae295f9a869235f6932227f1ce9404b9dcb895e3f8619e49fde65abd34afdc02f04980b93087cfaf0e1b95e0c50a40af3b6a31c98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f0a4cc46121032ba9d38e8abd2d759a
SHA1f8ea1d9c28e670b0033c29653c722f72fc0279de
SHA2569ed5a28565de083a18db96d2c64163a8728ef62c6facf8383812d1a697de4fc3
SHA512a128f173ac100cd8c657b50328456fdbd2dfd30384174a8a9b2000713b101e041ca9cbe8af1c4dd953c537be2c6983c2fc8268144f3c599348bb352924cf1846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5949dc452642e75cac42d61deb87177a6
SHA12aa2f3ae2384c7112e5c80da73b59b22c31ee9ae
SHA256d38d9934e9a56e7d54bbf8691ddf584403fb4b3bbe3122e1c0a7700b413f17be
SHA512ea7c6484cf26c12dfebec89adae42545b7ff2d301d2e8fa303b84fd3128dedaca3bad4bf5a0336f42062bab3b1dfd8d58cb7d326ba7ef739b92e37d14b231df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f7c97e076decc4f700a6845f58b4ce
SHA1f2c0c8d0a2caa17146e56b501c3dab47f9f35022
SHA256e88176c00d869fe5890e5cfc0144760fdc9cb3846792b1390c49b123088d5102
SHA512686ae68f4a446579f17a3861a7520d997b560d0dfec2e43b39a8727a781dc52643d8fb8aff9c6efb955d760bf92af305dacd52253ced16c4cebccc6ddc028075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3203492626e854f78f655a3533e8bab
SHA135712171dc0496ad41cc32f3e0e98349e3e39055
SHA256bc754d219ecd87e0e373bdf516f6bc20db360345686c1088dabd659b6f13607a
SHA512d4e88b4e2d44f583d60abafe76412ecf9673ea639ba1110683e48b9448490ca7d12312c30c2cc91bc237328eeeabf3f06baec436626c502d4a02b1b0cb34d7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58acfcda9a1be46f666f9e6568099dafe
SHA180cd2f47326e69dca429892be2dc5f921f39c466
SHA256266ed5bf3f34743272f7e1a0c7f50ec0a0879d019a72f0213fa22815e8b99a67
SHA512a5163279e05a01abcd14b28b4f767c2e418f4a35cc3a703d4101826a18b5186de1c2ba38731339c95664b16d2505db7e90a51c2104df32f2fcf5a55d15d57666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b4b80e269c8767998bec4a264e10361
SHA1bf2c87f7f0a0e326c0e660ca039a08a21bb084c3
SHA25647ac41ed779c076436c5d9ba7664134705971fd80218de1f0a21d64a19ab554a
SHA512c61f5cf14bc3264fbcf32c05d2cf20fdcb1df047c5e11f5e4c7bc808c633da9be8258b64b10e1efce3a11129a83c560b91c244b8ca0e954db34631becb115c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e8be42d96f043918bc67e206fcecb8
SHA169936d2b16ffa7bdc0951e5f8c2271af7e6b6956
SHA2566fced84dca3d7f8ffb1b59c77b5db0a3c86c3807838dcd693a9463a9617ea984
SHA512d0dd6621bd117b5f59789f907f4084c0ebf289ea20aa7ce9e868856066a668b270b6071d049f86073ffc109a279e278145d78bd1380bcb6e38314d4d588fa949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59917cc90cd928c4b164218022d52b660
SHA1fd5ed18208ae60a0f76ca52743ef2d8b8e19a896
SHA25672e65f6029d3a106dc5415c0b5425ba768fc9fabafcf7c09943ab0a3aaaafee2
SHA512ded37a435847f7f8a486ad3dea7ab2b546ec12ff7451d6dd90b8ab4d5d83f4e2a1aebda50ae7e8e04db4ecf9a68bb94d9b10486fc1ed6c447406f724a947da02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3e8cec034cb9e5cc7b8d360419b0c12
SHA1527b430715e641ef9f1f30fdd51c19826c9609e4
SHA2569fb5cd5aa71bde44d049bfa226407f8a2ec548e9c109b0d831bf02eff76ff3f8
SHA512aa9555c8784ac30f0ea8711b5c05580645deb476c5f5f33f891257c18c51b00c28796ebe7bef9edbec3ac860b9f1767b99cbff6169f89e4b7315e9589bdbcfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589b942d89567900209bfdafca3139691
SHA1df3e826fbe3068a4aaf18a36e226379f5e059e83
SHA256c79700a79500058f6d0e5d6c8bdff74dbaeae019d137230e890fc774129f3864
SHA5126250ab4af5e289d743ca980f180bddf72fcae90a10c4e13f7bfb17bbf41c379c340261b47dfcc3c3c9baaf61a51410feabf48cbafe5b260cb2076c68f08d72c3
-
Filesize
5KB
MD502dd1e98168ea15257ac2839c022b233
SHA1c0552f51f19d283f3c64e148f9441367e4022b6b
SHA256723593f8f1946015941e4973633fb9f936413a3da4dc06e793b03676d339ccab
SHA512da4ef2d685015e01e1f965b2b06147c0d8297e8e06d3b862a74a65b58830caf4953bee3af370060452e2960c095f6c08d9492d3cedaff0606a6332f0a95459bc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06