Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
7e4e11abd05cb6390fba06a6256ad675.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e4e11abd05cb6390fba06a6256ad675.exe
Resource
win10v2004-20231215-en
General
-
Target
7e4e11abd05cb6390fba06a6256ad675.exe
-
Size
48KB
-
MD5
7e4e11abd05cb6390fba06a6256ad675
-
SHA1
7f6b64e831be11ca1bdb8e0328b25c22915c881e
-
SHA256
d3a3543e334729e1e9600f591ff5b8bc8f896c39def73e592475ec80e87d0d4a
-
SHA512
c87b340b15297ef73b6567c1656cede13261ca570a6a2a718bb42911ce421c1a41d649eb2c1bbdaaad2f450db9430f6f3be47a94cbf2be2112d343d9a9164e8d
-
SSDEEP
1536:Urfr5GU+8Nie9qxlV5K3nVjehfkrabQdUE4++nh:Urf9GD8NieIxlV5KFjeN4+E4Bh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 7e4e11abd05cb6390fba06a6256ad675.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation ssvchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2712 LUVX.exe 2564 ssvchost.exe 4796 msvchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2712 LUVX.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\ssvchost.exe LUVX.exe File opened for modification C:\Windows\SysWOW64\rmnl.dll msvchost.exe File created C:\Windows\SysWOW64\regm64.dll LUVX.exe File created C:\Windows\SysWOW64\msvchost.exe LUVX.exe File opened for modification C:\Windows\SysWOW64\msvchost.exe LUVX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4084 4796 WerFault.exe 95 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1090851501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08a634a5239da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4d347bde384c849be64bb2f1c358fef0000000002000000000010660000000100002000000099845fca67f4e43b78d71a1491bd7e34be4bfb84fe68c84df9ff316159c2fb57000000000e8000000002000020000000c0596cc6d4642bfdc0b5c4c90e792ccf375fd8cae21c9fb2bbc87648c9f8a6b220000000f98a222e1344020ba59a2415bd5a28a6d4fa1d1359e9faf1d796eb033c03c1804000000002887b933501ecb7c549d0c885e2400fc312ce66b70960193b408307dbb9e44fef1922c5557e0c63ace5cf1f9c8ac1aa82692186a19d8e0c21d55e40b6b85129 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4d347bde384c849be64bb2f1c358fef00000000020000000000106600000001000020000000c6446fa1eb449d3a82f29c13a4a39b773726d6e9987e7f31ebb7e68f0c64394b000000000e8000000002000020000000d598ae92b0a2d48a4712133ac1e7fd9b5bb7855715416f9ee022fd44641b39e920000000195f7e42e22bccc413ccc98f4a269901dbe73597ed4b3465d286ab270b5d7cc14000000054bc7c7114f2e879fe645c13cfb053b772bc65cea893028e194cb3cec564aabe85de37e59fa9cf57807164366a3671733fc2cbdeea0916c49d1259f210701db1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1223820067" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407f5b4b5239da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6B4B5B73-A545-11EE-B6AD-FEBFAF1864CB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31078738" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31078738" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410507793" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31078738" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1090695117" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings 7e4e11abd05cb6390fba06a6256ad675.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1056 iexplore.exe 1056 iexplore.exe 3312 IEXPLORE.EXE 3312 IEXPLORE.EXE 3312 IEXPLORE.EXE 3312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5020 wrote to memory of 1056 5020 7e4e11abd05cb6390fba06a6256ad675.exe 91 PID 5020 wrote to memory of 1056 5020 7e4e11abd05cb6390fba06a6256ad675.exe 91 PID 5020 wrote to memory of 2712 5020 7e4e11abd05cb6390fba06a6256ad675.exe 92 PID 5020 wrote to memory of 2712 5020 7e4e11abd05cb6390fba06a6256ad675.exe 92 PID 5020 wrote to memory of 2712 5020 7e4e11abd05cb6390fba06a6256ad675.exe 92 PID 2712 wrote to memory of 2564 2712 LUVX.exe 94 PID 2712 wrote to memory of 2564 2712 LUVX.exe 94 PID 2712 wrote to memory of 2564 2712 LUVX.exe 94 PID 2564 wrote to memory of 4796 2564 ssvchost.exe 95 PID 2564 wrote to memory of 4796 2564 ssvchost.exe 95 PID 2564 wrote to memory of 4796 2564 ssvchost.exe 95 PID 1056 wrote to memory of 3312 1056 iexplore.exe 99 PID 1056 wrote to memory of 3312 1056 iexplore.exe 99 PID 1056 wrote to memory of 3312 1056 iexplore.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e4e11abd05cb6390fba06a6256ad675.exe"C:\Users\Admin\AppData\Local\Temp\7e4e11abd05cb6390fba06a6256ad675.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BRD.GIF2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3312
-
-
-
C:\Users\Admin\AppData\Local\Temp\LUVX.exeC:\Users\Admin\AppData\Local\Temp\LUVX.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\ssvchost.exe"C:\Windows\system32\ssvchost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\msvchost.exe"C:\Windows\system32\msvchost.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 5245⤵
- Program crash
PID:4084
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4796 -ip 47961⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
32KB
MD58e67ce6702304c62859cbe2652f05450
SHA19db761db7d6ea598f85e7c852313293f951dcd80
SHA256a652fbc0ae1f4cbd304add020e6e6931ac219bab31958aaeffc4a3cf45467a15
SHA5120cd63af3eda68080b4de9bba6f5a1548444b5708c67a7a24ed4f420646d7a864c4a548b6bc9fac3303ce5245dc423c7c53163318b29de2f7bb3fc9345a03a847
-
Filesize
12KB
MD549eeaae9faf68614c0723ae54447130b
SHA138b49ba4212d6ab5323f1fe791cd5cc5b9e7b759
SHA2565c219da1f6acc7601da7904f61b1fe10cf295a60c344db4a2e82e8718d28ca70
SHA5127f32edab4374fcf140a435186874a03e9eb645a24a5c443fa04c91248bb08f6bc1954786197a0cc655c1c32c6272e326b6328c5f925f174310e9b84bf486a3f4
-
Filesize
12KB
MD5618ba27f0502751f408b211f61747827
SHA1c78868c7b629d2e5d4f447099c9726379b6d421d
SHA2565c5b2b741b4a7a152f9750e36c61fab1f65ef41955013db8aa487a2ab29b6eb6
SHA512de6454a04c43c4d0d7f6604b9c0e61eea5fa88b9c15253817b7823b9e3446778331d25ca005625b69bf1f1cf01abe6b89dcdb752d6e179cb59be31f0439fe99d