Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
74c32b84d9e8b26453e10df972f827b8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74c32b84d9e8b26453e10df972f827b8.exe
Resource
win10v2004-20231222-en
General
-
Target
74c32b84d9e8b26453e10df972f827b8.exe
-
Size
40KB
-
MD5
74c32b84d9e8b26453e10df972f827b8
-
SHA1
8a915e7b07351b78de060931ff9c6fd0d1e957c5
-
SHA256
5aff7502e9e1fa1b06dd38582140432d411701336598c61389de5f0142a55018
-
SHA512
bbb165080b28041309f5648f1736fa6f79d6619a6c8e9263885d2d7c3f5882fae4a0b379d3866baa3d3ca906d71d8b53d9bfc0bc39a17a17e38ac18be0453e37
-
SSDEEP
768:TPtKjKWdL/skuHTVlHtcD9amIPdHgxjo:TP4j/NshfNcAmIPb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410721261" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408b249dbf40da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000001dcd9e43577b84709d838d00d82accc61bd839e018473a57c504279f7f7a28b000000000e80000000020000200000008d89a74801e5b5c8bd558a121772bea093ed2506808de649da174223146417d920000000fec995c8abf5a3c1496b91e93f78097a09f305b3fef9a6474b46dad372c5343840000000f121c442d243d66a34ce235b17e1480843acf112652bc7eb3a218318d2f093488be4608acfeeb197585db0caec83a04a95215584855334a37644508e21d7d17d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA070131-ACB2-11EE-B93A-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1104 74c32b84d9e8b26453e10df972f827b8.exe 2544 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1104 74c32b84d9e8b26453e10df972f827b8.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2544 1104 74c32b84d9e8b26453e10df972f827b8.exe 28 PID 1104 wrote to memory of 2544 1104 74c32b84d9e8b26453e10df972f827b8.exe 28 PID 1104 wrote to memory of 2544 1104 74c32b84d9e8b26453e10df972f827b8.exe 28 PID 1104 wrote to memory of 2544 1104 74c32b84d9e8b26453e10df972f827b8.exe 28 PID 2544 wrote to memory of 2080 2544 iexplore.exe 29 PID 2544 wrote to memory of 2080 2544 iexplore.exe 29 PID 2544 wrote to memory of 2080 2544 iexplore.exe 29 PID 2544 wrote to memory of 2080 2544 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\74c32b84d9e8b26453e10df972f827b8.exe"C:\Users\Admin\AppData\Local\Temp\74c32b84d9e8b26453e10df972f827b8.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.eachnet.com/?adid=owm_wma_05_desktop_hp2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b35a74cdc58d1b0d8c0f14753adb0e51
SHA1356ebbf5c2dea04871c276eac3074047e9b168aa
SHA25613bcef5f4e41e75c3927e4cc552338a96aa488ad5bdeec1d09ab38b654c9dc9f
SHA5124a37bcb7bda1820bf1ff144f482c49998e3138fa20d56aa6685e911137ff1a68fdac1f10d576a8b3bf1bd2fc9624d2415ba50b2055b3141b11e3b9596a5a6d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff0a5a12f1d411800592eb5aaa4dab3d
SHA1de0619c233e2afa8a7dafd8707a6635d45ef93c0
SHA256203f37b2454ef4c6bfd2d94469830e9472392a4baafffa266450c42e9134f350
SHA512aa197310a0587c698e1b0715b74489ce5f59130fbd21dc77f634dc5f4e0fbb01397f7d0fa3791e42c546d5fc6d547de1ce2880156473ef5885979f2ba50eb05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c6b19a4dc6877379b864f209ed8f6d4
SHA126f35254f476e95d635884e778f626c2e2f680d4
SHA256fbc0dca5d25b87c6fb93977e4b76a79c0662aa160ca797c6ea8df205b5c73c9e
SHA51238988e4029cb9a615fe6eae59d28a6fab2650cea3b76d6ef70caf372a2ec5bc355dc623aa000924d827b11706f7f0851e0bce833716a8bc3deaea33a9815c380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e18c5ad704bcb9c148d5a25e0cd7f15
SHA107bb56768c22ee32df868c4aaa7eebcd48fdf0df
SHA256e7e597b086ce12d1c6c1d35da5c6729418b941ab97852baa5c78bc815865d1d1
SHA5120258d9fe1fa5ffed440d15d67bf79c82a39c805c5150fb05ea67786d55f7f7afb2d086d13619505dcc1daa367f73406ac5ba87f9809d982e2ce1e8008523ed9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511e44787ecf5a4f2774e716de13240d0
SHA1401ed89b3529e0139d3077d734e1f194f66035d1
SHA256ba0c5cfc8d98bff3672f8d7ba9a4df84a04dbf1c7375d762f783189ad614c05f
SHA512a4ce1f7a121414939f189b95bf5540b85d7280eb302190a8eed12ebb0b63597a129ab6e92829f8b37ccb16d20878f7bc93bb06a995674d5edbff8958b9cfb3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520b62e000ed1f54139508ef2e1da0bd2
SHA1ce36e82afe5bf0eb9de874d3d5235b8e2a401b6e
SHA256b15760e876d93238d4a811471701aca736afcc381fed820dee4de936eaea8cc0
SHA5127635a8e2386deaddc4868213a180198610011aa6ee5019a428adb51db9314568a44b8bbe5c71d36b15fafa266a5af0391dba150daf5cc4ed86671fd82b392969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd78d2ec019a1827543f439ba76ebae2
SHA1c4401631a1bceff358bd140bc183b190aa6d60e1
SHA25616f9f439bba05f4ea45dc2a3c258b58596d53a2b7054fdb283bfee4e2a8a2a8d
SHA512e485fe6e46b58fa5589b7793e24cb12e3b778c797653bebd4bd84715b271bb0a3a8a891cccf79077bb46019812e9d29d7c6276a0d1386906888a5bbaa7c31ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce9d262043f67d0ac04a391f637a68e4
SHA1ba35267896e1a0dd671b906e6cf565dcdd051426
SHA25608aeca5f8a689d33ec6e849a6b623ef1960542bf9800caf302f1c60e995f1e40
SHA512241e10e17918a0ae9266502817141320ba2afd356b5579231a74aa1734eea5d586edfb7fc9d23a2b7aa9b924fb006ae9e138e5b2be5b000804c26425d9a8f737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef65772ba905c53b36db045b7694033f
SHA1536e3daa1f25884c71b80f167f782f069f838766
SHA2569c2710e65ee3ce5b452687a34aca49146c4ee0866c8ecf07d38249c497d45f6b
SHA51268afbff16f073118aabfb2bcb99ea4f1d825e980454ae77f1ea881a5c3f27a36ae62e639e17196ebc37ec5cd979e6d66edc21856f0d636d36a54d64cff45e37e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06