Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 12:02
Static task
static1
Behavioral task
behavioral1
Sample
6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe
Resource
win10v2004-20231222-en
General
-
Target
6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe
-
Size
253KB
-
MD5
6ce5afac5ba2fe2015d5bf0e3d8c9f93
-
SHA1
885c8b2a08cc32ed2943928f9cbbe481d71b0d82
-
SHA256
44ee1342f0017083995ffaff831d09e459932a0a3c911c06e62a68ffe84db884
-
SHA512
7657d60299f2e6d71dd9040df8422f3aa854b3abe090129bea7d8040e9ae3683342b06e679c90815591fafcfca943f0df223cc8b50064a07721eadefd1d59abc
-
SSDEEP
6144:SY94Narf098CKA+PwBy6cSz0fg/mOqKqhrIMu/3:R9OaT0981Jl1fgOdKQg3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation rinst.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe -
Executes dropped EXE 3 IoCs
pid Process 228 rinst.exe 1008 MSN Password Stealer.exe 1368 key.exe -
Loads dropped DLL 5 IoCs
pid Process 1368 key.exe 1008 MSN Password Stealer.exe 1368 key.exe 1368 key.exe 224 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\key = "C:\\Windows\\SysWOW64\\key.exe" key.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "PK IE Plugin" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} key.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\key.exe rinst.exe File created C:\Windows\SysWOW64\keyhk.dll rinst.exe File created C:\Windows\SysWOW64\keywb.dll rinst.exe File created C:\Windows\SysWOW64\inst.dat rinst.exe File created C:\Windows\SysWOW64\rinst.exe rinst.exe File opened for modification C:\Windows\SysWOW64\pk.bin key.exe File created C:\Windows\SysWOW64\pk.bin rinst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\ = "IE Class" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID\ = "PK.IE" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0 key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\keywb.dll" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID\ = "PK.IE.1" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS\ = "0" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\ = "IE Plugin Class" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer\ = "PK.IE.1" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0 key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1 key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ = "C:\\Windows\\SysWow64\\keywb.dll" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ThreadingModel = "Apartment" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\Programmable key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "IE Plugin Class" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32 key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A} key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\ = "BPK IE Plugin Type Library" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32 key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" key.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1368 key.exe 1368 key.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1368 key.exe 1008 MSN Password Stealer.exe 1368 key.exe 1368 key.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 224 wrote to memory of 228 224 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 88 PID 224 wrote to memory of 228 224 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 88 PID 224 wrote to memory of 228 224 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 88 PID 228 wrote to memory of 1008 228 rinst.exe 91 PID 228 wrote to memory of 1008 228 rinst.exe 91 PID 228 wrote to memory of 1008 228 rinst.exe 91 PID 228 wrote to memory of 1368 228 rinst.exe 92 PID 228 wrote to memory of 1368 228 rinst.exe 92 PID 228 wrote to memory of 1368 228 rinst.exe 92 PID 1368 wrote to memory of 4424 1368 key.exe 100 PID 1368 wrote to memory of 4424 1368 key.exe 100 PID 1368 wrote to memory of 4424 1368 key.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe"C:\Users\Admin\AppData\Local\Temp\6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
C:\Windows\SysWOW64\key.exeC:\Windows\system32\key.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} about:blank4⤵PID:4424
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD508ca19d445eecb4a4f2e01ef3dbbf936
SHA11660d70693ab06ab9cf10d193300f3a8daa2e05e
SHA25695223cc4c108fc7dd3289c8bb420219403cdb2c37a13397f9badde4163aa42ad
SHA512db7c1a4c8317df071a9e1f3507a1a349fc97298e2dc56e020059466f52e56ddc057e352e21ae2336a1519d3eeb4b73524061770b3e968d33ea2092f850becffa
-
Filesize
996B
MD575293f36b29713ddf9e491575cd9ba3c
SHA1d44ecf7167e4680979afd372181d5ef948d07214
SHA2567d0bc3f71c5b3e1ccf0d7ad31c6f47c09c77ff909b32ca414f5ab155f11a89fd
SHA512d494fba249f9f9715c314188f346427c8fa93b5807b4076a1bb7602e759e5161ec9ba5bea69175b0a6688cf3f9905deff6455ba007e53917ac7f4efefc3f6e4f
-
Filesize
428KB
MD5cafba206e1d7bcf25e7642226010a80a
SHA15af40cecd3c0f93068cbfdbca3bccabd1fea5def
SHA2562f5de67fb28c657cf352db7f1cb714b6ab97586d8a86b59e56509819754d0168
SHA5127407df747ea11f003ebae273b699224a40b70297ceb21e58aa375505909a78e9a8b9555a3a4cfb1d462da3619dea384c096709df890c1796bfa2070364e1b0bc
-
Filesize
24KB
MD501e4b6bbc6407336756588818c6f57e0
SHA13ef1fdd3e2a9e7dc492d73b0005f72ceffa9c101
SHA256dae5493e60f8c8f1bf33276084d3b4207ab1d24ff66453de59e786249c4f0d00
SHA512d715c0b4abe812fec73e78d3db985ed24515365d1d217a4df37f193120373f142afb3979dab66caa147285eaeddd6e15d569617274004b4e4932027f10f76762
-
Filesize
40KB
MD5c8f8519eda854af35f03e56ef14aee6e
SHA1dd5bd23b60b2c9f3e8d96ca1616d5d36ffaecb48
SHA256254660543a306e520ebc2c3fd4bbbfda6775154417db8f5fc3a4cd45cb85faef
SHA512ee77fb75a5a2f0f7bec34237466f63a81e8e4b972540fd6c49bf8a89e5cf6da92c23f605cebfd761f8d7a758c826e199f65fd4a9992122bf66936f08e31ee242
-
Filesize
4KB
MD5b570d4fdfcd44eea5ff8564b6099286d
SHA19560ef5d473ed86653f969c37745865d28af2caf
SHA2567165a1c89e0468756e2e37cf1539767e80bc2d26cf8a0d498aa56d32ac78d122
SHA512e8fbd7ede0e5468f622f58b5ae47760a1138c991a2202da6b835169cb08550d9275b1f666b273a6f8cf95b6aee9f15405dc2e4e7fa579762a7c13554fe0605c5
-
Filesize
7KB
MD5fbe4bab53f74d3049ef4b306d4cd8742
SHA16504b63908997a71a65997fa31eda4ae4de013e7
SHA256446658dd5af649857fff445c600f26cdc1d0c19c86a080f312b89b1890182092
SHA512d458ab806a3ed3d1494a13ad8a75df874a0b227cb4f337996cb82df3c4a26dc9c4fe48a664b53b052a4af123ea8d89911d9d9493870e6b5992d5621a32260c2f
-
Filesize
428KB
MD51112e89859a0f2b052d5eb1626e25664
SHA17864b86a7e0ac3fc28e898d06eefc829e8d3be02
SHA25692ff08bfffa729b69d6e4e128ee2fa03a1c1f367b168213e907bd3f70d64cb61
SHA512c45f365ade9829f07605e686d3998e24f39c7b73b97639412191d4fc0fda3bfa1a087669a9a8ba1eb859ff8135c80df730e4709594201cb531b2bc08ececcb9e
-
Filesize
24KB
MD57719e3244553dce7b70a9d1083e291dc
SHA1d7147a052b19bb08356ba6dea5cc0e6486a0121d
SHA2566c48b4fe62614ad35aab89b534310024770fbcaa669d50a462f4973feeee926f
SHA5125ea1aad723e1043028136c943899e5a33e4b58b119c927fb001891facae656277969ec31cd7035680eb5d97e401c22577a082c2cf728e9142a3f0c62d1d99beb
-
Filesize
40KB
MD521d4e01f38b5efd64ad6816fa0b44677
SHA15242d2c5b450c773b9fa3ad014a8aba9b7bb206a
SHA2563285df0c25d4b9b6d5ccbe166a3ce3d04f5cb3a0d61c8bf29bf5f953e51b0977
SHA51277dae941676a56664da89c7670d29ed5402032c8040df1cc231986733c78f0dc56c41f7a276ec9ea8336e3fa2bfc68d3121048e9585bf0d8a98917d799f669b8
-
Filesize
4KB
MD52a0ba30c92f6e112fe8fde81da9a8ff8
SHA12555d1c388a5493608b8325007ef7edd892cd5d6
SHA256a0ec3bc34a0e4b53174985d314b4821bd28672a69535d19cefe84b961ee2cadd
SHA512f6320876b1984644f90479ed80e76329ec920634abdaa40b56820900f692844dbe7610227d3524c13619c161186da363e8128b33e2bb58fbed05bb890fc4f566