Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
05e8e9a5d27f6359f19aa16f5a6599cd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05e8e9a5d27f6359f19aa16f5a6599cd.exe
Resource
win10v2004-20231215-en
General
-
Target
05e8e9a5d27f6359f19aa16f5a6599cd.exe
-
Size
280KB
-
MD5
05e8e9a5d27f6359f19aa16f5a6599cd
-
SHA1
a48b592df28065d1282ac4e2caee8504cac23290
-
SHA256
de5b656ac52293377b8d7051c5a734f82338cd8a96461d896d25f9a82bda9420
-
SHA512
7f65fb43dcf5191b2517d38c0ceecafc185f4682e92747fdbecbb4d8791d154169d1c638c6e1c9420b40594d687630c9d8b046cf2ef3a377e3e8b57829dc492a
-
SSDEEP
3072:0JdlhViHwy64lkvqcaipub0lxRrKy7dddc7fA6keXenDf9N9UlxCcMiT6W+MCc+o:0DlGHoyWpZl3rKyvySvDGN6WnCJOk
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 05e8e9a5d27f6359f19aa16f5a6599cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\lljyn_df = "C:\\Windows\\system\\lljyn080701.exe" 05e8e9a5d27f6359f19aa16f5a6599cd.exe -
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system\lljyn32.dll 05e8e9a5d27f6359f19aa16f5a6599cd.exe File created C:\Windows\system\lljyn32.dll 05e8e9a5d27f6359f19aa16f5a6599cd.exe File created C:\Windows\system\lljyn080701.exe 05e8e9a5d27f6359f19aa16f5a6599cd.exe File opened for modification C:\Windows\system\lljyn080701.exe 05e8e9a5d27f6359f19aa16f5a6599cd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1672CCB1-A6D1-11EE-9BAD-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410074620" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" 05e8e9a5d27f6359f19aa16f5a6599cd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2704 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe Token: SeDebugPrivilege 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe Token: SeDebugPrivilege 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe Token: SeDebugPrivilege 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1512 iexplore.exe 1512 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1512 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 28 PID 1060 wrote to memory of 1512 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 28 PID 1060 wrote to memory of 1512 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 28 PID 1060 wrote to memory of 1512 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 28 PID 1512 wrote to memory of 2852 1512 iexplore.exe 29 PID 1512 wrote to memory of 2852 1512 iexplore.exe 29 PID 1512 wrote to memory of 2852 1512 iexplore.exe 29 PID 1512 wrote to memory of 2852 1512 iexplore.exe 29 PID 1060 wrote to memory of 1512 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 28 PID 1060 wrote to memory of 2640 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 33 PID 1060 wrote to memory of 2640 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 33 PID 1060 wrote to memory of 2640 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 33 PID 1060 wrote to memory of 2640 1060 05e8e9a5d27f6359f19aa16f5a6599cd.exe 33 PID 2640 wrote to memory of 2704 2640 cmd.exe 31 PID 2640 wrote to memory of 2704 2640 cmd.exe 31 PID 2640 wrote to memory of 2704 2640 cmd.exe 31 PID 2640 wrote to memory of 2704 2640 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e8e9a5d27f6359f19aa16f5a6599cd.exe"C:\Users\Admin\AppData\Local\Temp\05e8e9a5d27f6359f19aa16f5a6599cd.exe"1⤵
- Adds policy Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\dfDelmlljy.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2640
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.11⤵
- Runs ping.exe
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597e66dff80421e67905f43ef6984b368
SHA162f858bbd7774c58f3c9cc42279807d021ea818b
SHA256dd9bed141db2fe5d4285c1bbaf08ac2525342dc0f2a9e3192921efe4dc3be9d5
SHA5129477899c8b33ac81935d65e55423319481ac4802fb4ef43c3f75841f16e9a124ecc6cfa0aa488bba2b5513672d1208021a4b7052cf0464331297eff5f0e301aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c50ded058c0a758cca070e64ea123968
SHA181c8ec065b9bc6ba7b96a872acee483c7de0dace
SHA256cec8fd5bab93b68935c7bfa1382837ca4a1f9c19b2dfe3b3463d03963cddff66
SHA51214fea0e777a482898999aeafa28fee31aa1769f263911b40bf4909603b109bacaa2d1ea0565a75bd2cdfff41a8ac36cecfa8f02b5e1f37480b370125f3fe7875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5530b2a25fa537177b653e9eb129a3c75
SHA1c693e52267623bf6894b2cb67653c52bc29f246f
SHA256be93051836d22ea1e97b4dada17df1eb36196e57565b16214bfee53a6a27a8c8
SHA5124ee951acf8b9128b21fa53e58bf72049e73c97c38b1528fb5d930adc158846fb5ccaef5ab73de429c785f77f5ba804fe162293ecae1afd538be377d4f257be5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fd154c0e86dca0f94add45b59a14249
SHA1b1027ac2d974429b84553a03bdf7ed4d8b19d2ce
SHA256d48150ea4436c9df9f91edd61e094086bdd3297696f0c06400098fba3aba04ea
SHA512476a1b3fb6fd74ba7600a555d705355cd35d7419683025443ca52c772325c41ee07638d8bc2acd46098a0dcbab8184cb40fd176f505ab1f2d2b4cd05d8e38abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567666064637ea56051afa19c88e0c840
SHA129518773896585bbcf5d8e77b9c1a5470de096a5
SHA2564621109eea9c81422b65310f5cae04bab7c6fcedc8c8d3df476c55d312fb07ce
SHA5120195c95aa92a4ac24837e55dff00403d408790f56aa7063929f64014e47e0c1f8ba11e54b579a99d9c0adc2e15537e1ec64ac3866947bb42398ba0e5378bff33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f3618862aec605776875ed912c42e06
SHA1ab6eac2898a516d8d6187020b9e17744d945d28b
SHA2560ff22f337aad47de253a04c7f0d42c501bf22457d9de213dec6257e03af85d6e
SHA512ebeead382d8178d508d4f7076a5e37006d14de9329f0d348e1c47283c8f9257169b0c0ed39c68b2f3bfc6d7987af0f6e778207c963f1efddd2dac44e67d978a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50baa8f3ec20e9c2b4553dc6d08aeffe3
SHA1b5739e4978484124647b31bc7f32587e0fdf5a82
SHA2566915eaf83b56bca406ddd3ae914445691ddd19f8ae3672a7fb3fd6ca5c42a07c
SHA5124f230031e53de2f1531f0bf8457e1ac653454b7674c7cae3eafa7b524e8f5203747679d90418e29ac73bf667dc6930a08b04fb8434203a0f66e2ed685997485c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a50c90fde3faa14dd4d77b65b93f5b8d
SHA1a743baad1e03ee1ae2c30bc7c3068f9eb99bbbf4
SHA2564b669c3fe3d5a61dc94ec862a18229c37979b43123e2117ce032959ce222c074
SHA5124211163a594649c3d96d4a4aac918da47cad71c9a5203e3cc4902d98501bbdb30aa82097fdd059e9bbbdfe3d917a0e9ad27709a4bd68deb28c9ccce8c2f1a5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a2b74d7ee82dd2d2ee1a181fbddbae6
SHA10ef42dd5509c44b6f4795705ee49f5ed835d2b8a
SHA256ad24e3525436d962286bc5917cbdb7cc55bb89c773dc2a9562d0fce2c068882a
SHA512a321fe3d9be1538bce96e4c94ef6d262a7b264c522b8356f11047c426525c0124eae547ab8fea406f9163c5c3ca96a35d9349d7942407e9637ff28ed0727efb4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
205B
MD5bf2ada71d83b675fbb93011690dd38ed
SHA1158c5b971507040d429fa1c8815a4c311ecfb2ce
SHA256be92b5758d8805e92a07396747f8a2a116145ed0a1521b7642fb9adbb126f9b7
SHA512dd9594ec455f38cc696a4eb783a56fdcf5382cf56bd3a35d1bc3703dfb9e960be1a041039c1d7baa38d54ad3a823a9898d67a7edea50456f4dda588f95993bd0