Analysis
-
max time kernel
200s -
max time network
232s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 21:59
Behavioral task
behavioral1
Sample
05053f2a14552390a5bb222d3fc1b9e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05053f2a14552390a5bb222d3fc1b9e3.exe
Resource
win10v2004-20231215-en
General
-
Target
05053f2a14552390a5bb222d3fc1b9e3.exe
-
Size
1.8MB
-
MD5
05053f2a14552390a5bb222d3fc1b9e3
-
SHA1
e3f484e0ba4037999bf84a42e8822f3de2a64263
-
SHA256
e5fe560369c76c158933027926490eb2ee6ed15be7d5302750024a23cb4eed42
-
SHA512
e95978091c10a00e1013870f91f9d4caca383ddd2a2c64f0d8ec1de7c0742ac4b7e775773942a1d680b013fe89a63625ec95b0c3b07b71eb921e015e3846eb93
-
SSDEEP
49152:I3gpBaX2YkaeO5ca1SG4hld9wOj3mkQE0MCOIURmgx:I3IBM2y5caILh79j3nQlET
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c0657bf73ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c1930000000000200000000001066000000010000200000008f00341d43138e2d7a3734cc2bfa2b8dd7331acceaf7f1a32978a075a4c9d22c000000000e80000000020000200000003188c501b831e1ffdfa399f12ad80c2db34cd46cf6087273154042bc175f0a162000000051b7097264e85d0c06fcbace5b8e9fc033aae4113c3f619151c9c03ed61f9d354000000010bedb9b707efaa19f1804c3e3f89493677e9700b087ebe18236036ef9d5c0e021367f8a963cba3051cfe636f2b3d46415624773ed0218afb4bf6919a3d7902a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88C44BE1-A6EA-11EE-82E6-F2B23B8A8DD7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410085549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1856 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1988 05053f2a14552390a5bb222d3fc1b9e3.exe 1988 05053f2a14552390a5bb222d3fc1b9e3.exe 1856 iexplore.exe 1856 iexplore.exe 560 IEXPLORE.EXE 560 IEXPLORE.EXE 560 IEXPLORE.EXE 560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1856 1988 05053f2a14552390a5bb222d3fc1b9e3.exe 27 PID 1988 wrote to memory of 1856 1988 05053f2a14552390a5bb222d3fc1b9e3.exe 27 PID 1988 wrote to memory of 1856 1988 05053f2a14552390a5bb222d3fc1b9e3.exe 27 PID 1988 wrote to memory of 1856 1988 05053f2a14552390a5bb222d3fc1b9e3.exe 27 PID 1856 wrote to memory of 560 1856 iexplore.exe 29 PID 1856 wrote to memory of 560 1856 iexplore.exe 29 PID 1856 wrote to memory of 560 1856 iexplore.exe 29 PID 1856 wrote to memory of 560 1856 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\05053f2a14552390a5bb222d3fc1b9e3.exe"C:\Users\Admin\AppData\Local\Temp\05053f2a14552390a5bb222d3fc1b9e3.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://blog.sina.com.cn/baxukun2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d791e4e5e2403b9433532148662f4f15
SHA1e3572808469b47b88fdd5550c557abae4d40f7a5
SHA256b9e3eb092fc37c4084999e42b51247911ca0e3c209295ea67ced7f1207250282
SHA512bbc5c7737b8755f439087146f4868d4d8eb8f4425eb548bc603f6e1bc37fdec8601aa78e0716260398160df87652d0293183f6e6f42c3931cbc96ef4599cdfa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dec8006d44d06f2196ea396e88596fa6
SHA1e4fab3f19e093a5b569e1675623ef85869458dcd
SHA256b8caa68f53ec78fb5b91dc753c3ad48c7cf0b83fffe142690335961b4b908174
SHA5124aa75e36b2c3acb022f67bc66b7045ef464e9efd09b7ba9670f89b923ca6409ef395463a844417ecdb7481ce4bae73427e54ed537cec005e34e5229832ffc7c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca34aa291ddba0798ecd765247315d5f
SHA12300fd73802a422bd0a61ba610bcae8beba629d6
SHA2562b6205f91a11192d9c2574529773635c2465e63e9b1be3e2005a15d91b2d234c
SHA512317d3617898870dceb00035c8aae70dd26f598baa59aeac7bf9daa59abc86ac1d7990b375c3ef2b4105782fb847ac96f5a72fe5ba10c0818b238ab1d37548089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdeb4a32aabb46a62d0ca3bd7375ad8b
SHA1409ec27b8b71fbb0b07e7912d7beb198adc7d35f
SHA256c2774ef9d9525be89c359f04d7b9a4ed317474102f3d0f819f2cec642d5ff95f
SHA5127a2ad7b3b1ec154ea5ba7629e41a90876ec598699565ea56ea22014fa127aac8024c392723e8f88c0838aa43f8a56fcc186a01efce1d0e1ce8fd5e992487aa4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb2d88009a3bf9875e0bc0a9f018d4f2
SHA1d6e32d84539aa7848627726957fdc4b01de52ec6
SHA256c41e06a5c41dc31ec03ceb018aeb4d03d6a8af792190691041d407e8d051eef7
SHA5124b4137460fb783b8d03ec340b27c5e13de750fd376afd39b25827ea6107511cf228e611d287ecf1a84967c30905d7f69712696765e11be555433c65bf7a9434f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf494c4e7d74d27ec440140a63440255
SHA1ff17245590baf1c3fd51e36dac703a54bb1f41a9
SHA25692031c3f6759e4031621fcb88690b32d22069bd9ddcbe70c07645177b1d68ec4
SHA512fc584a5ab5d16889b0a2b9d99d5568796ddd50d663421d033e2a890063b5fd92c071b75eb2290939856277b568ea39da8734de770ad220313f485cad3ad95e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d27f12bb6baca52ec59b69fd5b085021
SHA14eee7ffd3c68997941db94e4dca050675acae2b9
SHA256c5774536e72edfc175f10991132f954ef996302c921d20c8cc8edcb83d0936e9
SHA5120bca8e7afe823da1652724ec841fa80c776382357a5d76a95b986026ec08d05c2852cff80b0e8f20e2d9e833dad51978f488ce0b5eba01965d6cc5ee10a8de41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567d1408d72f89153e77a452cf7ffc340
SHA13fa6b6025147bc8a2bacbc55a6f4540f3d996518
SHA256a64264d5c65b6b86c542e466970f993d14f2448082034664ac98dec76661929d
SHA512de7725abcebd52d2062ad17bbad013df7956c5c833491514dec8c356c89e0671874463e58514bbb99cce32aae68fb88d93affa809f9694175e99dc779fbc030c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5876a08707d5c799dd289cbe7245d7b28
SHA132ab0b699ba7fa21eab7eea9033e867ead3c7ade
SHA256c223f4509a340cc49fc86cd5450f605deb082e2314cfe29c016861d2a47baad3
SHA5129140e572ff28ed260b4c64594898d4e2beebfbc51deb631bbfabc0b9d64535b7557e5d747e91f508abae89cd7bdee9575dc250e3fd0813f20787575c34e7ce00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503f44c4fafd69d32acb106be747c1dde
SHA1d1440a682b74dd6fdfdb87d8327f7d4bc3bf2577
SHA25618aea947d0f36d1b19c1a7068c8c2dd113ecaa91e2e4ab6c2348795e4c7f8636
SHA51212b5ed34aed7bc4f3fcca9f83d5843474aeadc20f2ee44d6990222e86528bf0cf1e85849d48273abf0443a0b5eea5d85e8641b628b5fee76e0bcd7e29e1cc0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d1b6c7b4af646bdcabc31b8265c6fef
SHA1ed1f65b13d9cfb35dc2cabbb3def126e4c113c96
SHA256c1e87c76977e393b38ef118ae578945153f4ea394b0fb85ee2e50cb2c2084fd2
SHA5122bc3b755ce6c35f91bc9d1e94245bafd360982bf7375ad485a496312ded40281a215774506611103a633c555eaefa03e49af35df7d200024b3fc59a36cb9d75a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e84a22fb23f563a48f265c682f0c629b
SHA1223c862259eeea4ba45ea9cdb9570dc98ddf0625
SHA256e7729e2e6db1d9662238865d248dfaf83f64edcdb75c75fb7dc1cc1be08b1227
SHA512cf6dcd3babf2fb8b054777206c672297b2ad66243f8329f01bf5ec81423db63a7422963c830399d7cbcffe47c77e94891a327f99b5cefa026a0cf7ccd9f9e38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54074fa151dcd163b5eaef74d70565019
SHA1eafa7f453736894512c329d34032a58eb127714c
SHA2567fc54f332679eb1d472742615bef4c3a3ae5254d89205ab15034fb6fc80c3607
SHA512c541209f07e9349e94633e6983c0ab18f729132306370c4f0db47bc695bb6f0fecdfeb11e6607568722e48aeb450e416c50da48ed2cd7e544de9fe5bda9fd0d3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06