Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
f8f012bbc9d57faf9eaf152070f026f9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f8f012bbc9d57faf9eaf152070f026f9.exe
Resource
win10v2004-20231215-en
General
-
Target
f8f012bbc9d57faf9eaf152070f026f9.exe
-
Size
44KB
-
MD5
f8f012bbc9d57faf9eaf152070f026f9
-
SHA1
b0430b1e5b43526c55b1148f56aa65de1315e6f7
-
SHA256
d474477f6b6b4539fe0685655e357a41f4254bac3e331f0c3103d4b67af009fd
-
SHA512
c70bc8cb9e017904c54c4b3888e4c16eeb2c82528e50f40b3a21bf13dd094e56615c9fb085f9f7c09c7a838f24b1b2c93cbf40df943db8562441e5b69bb52a03
-
SSDEEP
384:COt6sQ/ybtyRtwRNZh9rhgqrpvygchNeLL7IsREwRNZh9rIyRPb4U6sQq8:LcsQ/2jVXlv9ch4P7IsRvVr4/sQq
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A50C461-AF2F-11EE-A68A-46FC6C3D459E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200984013c43da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000df3fe6534073b9f54a5ce8d42958e046244212f0b557c6365441af6ae3f9a4e2000000000e8000000002000020000000eda7022c9ac36d05fe4b3fa0003c6a71722e50e8ccc4c3271bbcc88d12c083712000000010f101cf126f4932f547d33465b6550c019452597509ead5a6ab46a1b36b271f4000000006ed331d2e401002e3aba5f6d5729cbff432ce95b31f4f72edb600cd4405686e52436d2c9b98e40f22ed83e9a5d0c561c3dc95250425207cfe20541c84eef9f3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410994630" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2372 f8f012bbc9d57faf9eaf152070f026f9.exe 3016 iexplore.exe 3016 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2204 3016 iexplore.exe 15 PID 3016 wrote to memory of 2204 3016 iexplore.exe 15 PID 3016 wrote to memory of 2204 3016 iexplore.exe 15 PID 3016 wrote to memory of 2204 3016 iexplore.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8f012bbc9d57faf9eaf152070f026f9.exe"C:\Users\Admin\AppData\Local\Temp\f8f012bbc9d57faf9eaf152070f026f9.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2372
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f9e2c5dfc8fc3134e8a6605ab4d983c4
SHA1c8b7b579a4e444c088a52f29f578d6300d11358c
SHA256394faa7119376175a0810ec9d58ae2c8c4bc0b820122ec4f193cbd81472f19fb
SHA512b6ecc75b5432ed955f555834b9707951a8f2d38cde7179a5871b9dc61cd22b771fe4e801609c90e05c96df71e7c968286da191d366b9f07456ff4b1020415d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50a5c0bfd707091507c839b3807401aff
SHA125dc6b4a4851510240e459018bbfa34864beee7e
SHA256bea376462c32b6abe242104977ae50de3e76c1873f67c4816426ea56497b022f
SHA5122fb164b7e6491f90b592218fb74b29252c63fb3ca705191518edaa623586c9a8306ff1c7f828c29f3deb3b3b528124aa3cd387844792c248d408d9f2520d6587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d68353f83f9bf5c29eea0c5097e47108
SHA1e12c7dbded14e58e6643fa4f5c1d51f8dc6b1941
SHA256b0b931abca38301754ca628c1f2959d2f22e75bbbbf9d600b4ece0094b00c18a
SHA512a3ab6831ec75cb1c5f315354c985170fc0f923df8a5e9c41ed635b51b68ededbc03fbb4711ac7f7ea27db878d2a7fe5d94fc5607f670a8ee41dad9a134bdfe7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d029b59e56f5229c7946ab502e6cd723
SHA15f3ad61191a6e9b7acab38f4aa7774568a57f411
SHA2564d7b8f15a2696544fd7d8ce737c25b32202df7cd20e1e8c40191f8c6e07fddd4
SHA512f4960a55458cfa6967c38287efdc09f061b7dc45a5610fb9a8122ea0fc830564fc58d3b2656762dc89f166c25f0ddb737467b1f3f0ef696c44298c2f8bd21801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abafa41cbf2210c3915fcb20d5c1254c
SHA145aba69e62f058d1e7fe07ee6e61064599b2944a
SHA256d3ef3fe9e874e57c1091d25de50055dbed624026af51902b7d6f1fc9ac07a5c6
SHA512ebfcac58f06e571c1afe81f7e10e4e73c47d6510b56e2d3637e6f187c947367598f44f080fb80e57f4d5f842bb897910836631dc279466af5699ea0658d98e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779a6801a4edd60f3a11274683233a3e
SHA1381ff2d9180683c9f19f5c43cf8702c30b4c0d0c
SHA256b380e8e8ac2c1d2bb2d826ead8218764a5d7e182d459baec3e1c4b4ebaaab072
SHA512a61253c095d90f6da61ced4a0988ab6d61b86df91b46a6518981084e728541928696143168c1e39727a9a4ee3f2373004dedf02990db5b7b94382eed188e16f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556d6fa1d3e5bbb1b66a910b27356a7fd
SHA136398462c6344d6b63dd14e50bb93f2f947b9222
SHA2568e37300aebfd7c3f13f2c2a2bbebece975e789865a741ed86b0530ac8fde444c
SHA5120071a87f06a34de237b3e6e017f1c558dd668a8bbad1001a0d96c10c6a1d9b0d11b5d36eeca491116c983eb664c929a334543be31296601f47089c398bc960f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD568bac59b153dc0b245daa97d2aed6445
SHA1be6dee4970b0350e93095f6d528102af599fe647
SHA2562f5cf0b5070f619d3567208d85f4fb7a8c38ed61f0b7e76f5eff2f8b4bdea24d
SHA512f28884ab218f31a62d8a56d7d25b08386f775f18cb8514be132851e921012d8ef52f5a4a3526fb16612cb10208d9800b549edf21fcf047c338652b8c06e00f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06