Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 06:36
Behavioral task
behavioral1
Sample
5a045bedbd213af060f9acb47528a372.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a045bedbd213af060f9acb47528a372.exe
Resource
win10v2004-20231215-en
General
-
Target
5a045bedbd213af060f9acb47528a372.exe
-
Size
76KB
-
MD5
5a045bedbd213af060f9acb47528a372
-
SHA1
51a8d94415d2e5402f423708a4232d8e2cdf1779
-
SHA256
818b414189c41b42c3dc4d389031714733bd28400fe0eba59020233ce80132f4
-
SHA512
b3d9b70114164ee5f77a917593570200f72e393e5d8f6d7925c15a8d7a33167b76c54f6e0d9de4c1b6a453fea1411e1e73644ae355fd249d49d4c6d40db2136d
-
SSDEEP
1536:sngmKWFSCzpgZnknDk3DdTlvGsO5BHDB/zrkkejzNXyN+ZX0:VC0Gp4knD8xZyjpzwke/NXyNGE
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/848-0-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral1/memory/848-3-0x0000000000400000-0x0000000000448000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" 5a045bedbd213af060f9acb47528a372.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9C354B1-AC34-11EE-9201-42DF7B237CB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705cf7b54140da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 5a045bedbd213af060f9acb47528a372.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Download 5a045bedbd213af060f9acb47528a372.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410667241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000009e5c5e20241f3d2d4cf3b6c470da1cb3538cb78661ff73c2184e4ef2376d4e17000000000e8000000002000020000000dcc9b54d2a60ce1a0546db66c7597133536cab6fcb4e42d3c8592af920881aab20000000b3c065214b256e3fcdff1656b569ba06efa5a95761c54d2ae6c095df99a7adde40000000354d7c228e4daf83809013bbda9009a23162ca030ee8dcd4c8a58cddbb7d927438e130ddeec2d6274b0d9d8950da33d386c7b3ea4b518dc8bd41db693f1929f2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 5a045bedbd213af060f9acb47528a372.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe 848 5a045bedbd213af060f9acb47528a372.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 848 5a045bedbd213af060f9acb47528a372.exe 2728 iexplore.exe 2728 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 848 wrote to memory of 2728 848 5a045bedbd213af060f9acb47528a372.exe 28 PID 848 wrote to memory of 2728 848 5a045bedbd213af060f9acb47528a372.exe 28 PID 848 wrote to memory of 2728 848 5a045bedbd213af060f9acb47528a372.exe 28 PID 848 wrote to memory of 2728 848 5a045bedbd213af060f9acb47528a372.exe 28 PID 2728 wrote to memory of 2832 2728 iexplore.exe 30 PID 2728 wrote to memory of 2832 2728 iexplore.exe 30 PID 2728 wrote to memory of 2832 2728 iexplore.exe 30 PID 2728 wrote to memory of 2832 2728 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a045bedbd213af060f9acb47528a372.exe"C:\Users\Admin\AppData\Local\Temp\5a045bedbd213af060f9acb47528a372.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=FvCdqOQZQuk2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d57cdb3a65f46a8c89d9dd230442575d
SHA1b843d5238e15173455eac3a7da27920e7f2c4e82
SHA256a3ddc49702f8368ca4456426b9450e4a2052cb91ae8743c30b14632dc1a44141
SHA5126acb2e595b0ae7e4508f3d8f6a11b9f6e2e89edc916b09287acfbd6ecbfa29fd4714840e762e06fab275fd41d622e7f1e365ddb242aade1db78abd4940708b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8b831f1ce48dedef90fc6b0b3ba48bf
SHA1cddfd1e5f098b1326a1f10925bb6c98aa7bb7031
SHA2560786e9b6b20f61bb090530a0db71a55de98a0746eef6692760899e9f090800a3
SHA512ba20e5f0a4a5f1796db210d1fb41f2eb21ac789a75f3087af9ab7f7f1ac3b230da61ba877d0e7bd2d3545f634ba5055b4984298ee88b4fa2cdb7cb014c473e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d07362994961a5e66f34936abf2e137f
SHA162feac77d6b353896eac001d2a480de7ffdd7c32
SHA256ad2ec99e0be521e85e918b10c0d51d6027a0b666f208a6d6b770943b463f1543
SHA51222e836525e66e8fe33504422dd690ba4fde15ed026fb61eca3d51964b3b674a9f937ac275ab9c6bffae44900a75c240c527988f81bd8163a670d495e7beb22d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a8cc85fef1c615947c8703e008350d1
SHA1ff4339e131e8b6f5cdd78dcce09ef6839d54ea53
SHA256706da541a77ea6e44163966a6fcddfa1c041e959265bf32a5847a27d9d3bad50
SHA512f2038efa3818d05ea9fa8f15047ad47b89400a3051cff51899b0f098c8243b77f16ace36efe1e50c8a20198ca60fed3edbc6c81977761d68467ff641cdc4da06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac225b6306a46b4f580a341a890f37c
SHA1dc484f3f1c7dcb308012f11f1e187cb68aee2b64
SHA2562ba44ca18cc1a072650a49ab3e263e25532d6aa7be3a89d848e2e9abc6ee6fbd
SHA512dca401ef898da7acdcabd7334ffd18c49dfd09f54c3ce49670c8ed49b6884e1fb71fd98471368f6998a4674c9a20eb2157e836be286259660d5b1641e6a98f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58540c51f7abf925e2d67ccf8a2bf2daf
SHA1b925e29dd755e8d90315d9290abe5abe8de3e161
SHA2569c845d8af9ed5414a2dbc1cc98359beded43e70a90de419f6310b72ac6642b37
SHA512f6938090a11d15d20b8b28818f31d9b9bb12fec2d4a62601ab7034373a3f68659811dcb25e44b26996918926edf4d73ecfd8e14417738fe0930d3a39b4e42a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585dce422e37ab7d8a108514ebac2cbd6
SHA13269d677d41357c65ae278ea386496c83cb2dd1d
SHA256c52f4550ebc4a17d65a5aa83551b9f02d72300db8131a114887b0f3df1996f00
SHA5120dc9a1f50b4db3e2e8525a7f2802c1a3f59c77e385d858fa0b1080044d05fee1c0ebec708615b270c4a33d174d05b58a73be4af5777c3bd9b7d9dbc06dd9389d
-
Filesize
1KB
MD532e739b3f4025742939ea7976b7d1ed5
SHA1df57b514a7cb9eb1b7f17deb1942dd702b068676
SHA2569473deda27694c9cfd9064dc99d874e3343bf806ebb9d1dfe1801f5b7ff2d473
SHA51208ef28d1fefc5837fdb22219fe70eb16d86aaaef3ce154f585e23cb59aa3140c9d2cd2a980e33c7d9e214df15b71d1a00a54909c28745a1720e8a79dc94e0943
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\favicon[2].ico
Filesize1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06